Open Access
ITM Web Conf.
Volume 57, 2023
Fifth International Conference on Advances in Electrical and Computer Technologies 2023 (ICAECT 2023)
Article Number 01012
Number of page(s) 13
Section Software Engineering & Information Technology
Published online 10 November 2023
  1. K. Joshi, “A New Approach of Text Steganography Using ASCII Values.” pp. 490–493, 2018. [Google Scholar]
  2. Shivani, V. K. Yadav, and S. Batham, “A Novel Approach of Bulk Data Hiding using Text Steganography, ” Procedia Comput. Sci., vol. 57, pp. 1401–1410, 2015, doi: 10.1016/j.procs.2015.07.457 [CrossRef] [Google Scholar]
  3. S. Roy and M. Manasmita, “A novel approach to format based text Steganography, ” ACM Int. Conf. Proceeding Ser., no. May, pp. 511–516, 2011, doi: 10.1145/1947940.1948046. [Google Scholar]
  4. P. Srilakshmi, C. Himabindu, N. Chaitanya, S. V. Muralidhar, M. V. Sumanth, and K. Vinay, “Text embedding using image Steganography in spatial domain, ” Int. J. Eng. Technol., vol. 7, no. 3.6, p. 1, 2018, doi: 10.14419/ijet.v7i3.6.14922. [CrossRef] [Google Scholar]
  5. Zhang and H. Zhong, “A text hiding method using multiple-base notational system with high embedding capacity, ” Proc. 2014 7th Int. Congr. Image Signal Process. CISP 2014, pp. 622–627, 2014, doi: 10.1109/CISP.2014.7003854. [Google Scholar]
  6. R. J. Mstafa and I. S. Member, “A DCT-based Robust Video Steganographic Method Using BCH Error Correcting Codes, ” 2016. [Google Scholar]
  7. and L. L. Y. Zhang, M. Zhang, X. Yang, “Title Video Steganography in the compressed area Seyed Sahand Mohammadi Ziabari January 2017 Table of Contents, ” no. January. 2017. [Google Scholar]
  8. K. B. Sudeepa, K. Raju, H. S. Ranjan Kumar, and G. Aithal, “A New Approach for Video Steganography Based on Randomization and Parallelization, ” Phys. Procedia, vol. 78, pp. 483–490, 2016, doi: 10.1016/j.procs.2016.02.092. [Google Scholar]
  9. P. Kumar Bandyopadhyay, “various methods of video Steganography 1 Souma Pal and, ” no. October, 2018. [Google Scholar]
  10. S. Khosla and P. Kaur, “Secure Data Hiding Technique using Video Steganography and Watermarking, ” Int. J. Comput. Appl., vol. 95, no. 20, pp. 7–12, 2014, doi: 10.5120/16708-6861. [Google Scholar]
  11. Volkhonskiy, I. Nazarov, and E. Burnaev, “Steganographic Generative Adversarial Networks, ” no. June, 2017. [Google Scholar]
  12. X. Zhou, W. Gong, W. Fu, and L. Jin, “An improved method for LSB based color image Steganography combined with cryptography, ” 2016 IEEE/ACIS 15th Int. Conf. Comput. Inf. Sci. ICIS 2016 Proc., pp. 4–7, 2016, doi: 10.1109/ICIS.2016.7550955. [Google Scholar]
  13. J. Zhu, R. Kaplan, J. Johnson, and L. Fei-Fei, “HiDDeN: Hiding data with deep networks, ” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11219 LNCS, pp. 682–697, 2018, doi: 10.1007/978-3-030-012670_40. [Google Scholar]
  14. R. Hegde and S. Jagadeesha, “Design and Implementation of Image Steganography by using LSB Replacement Algorithm and Pseudo Random Encoding Technique, ” Int. J. Recent Innov. Trends Comput. Commun., vol. 3, no. 7, pp. 4415–4420, 2015. [Google Scholar]
  15. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value differencing, ” Pattern Recognit. Lett., vol. 24, no. 9–10, pp. 1613–1626, 2003, doi: 10.1016/S0167-8655(02)00402-6. [CrossRef] [Google Scholar]
  16. Kumar and Anuradha, “Enhanced LSB technique for audio Steganography, ” 2012 3rd Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2012, no. July, pp. 26–29, 2012, doi: 10.1109/ICCCNT.2012.6395978. [Google Scholar]
  17. P. Johri, A. Kumar, and Amba, “Review paper on text and audio Steganography using GA, ” Int. Conf. Comput. Commun. Autom. ICCCA 2015, pp. 190–192, 2015, doi: 10.1109/CCAA.2015.7148403. [CrossRef] [Google Scholar]
  18. Sazeen et al., “A novel Steganography approach for audio files A Novel Steganography Approach for Audio Files, ” pp. 0–14, 2020. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.