Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Which Bit Is Better in Least Significant Bit?
(Articles)
Fatin E. M. Al-Obaidi
,
Ali Jassim Mohamed Ali
Journal of Information Security
Vol.6 No.3
,May 14, 2015
DOI:
10.4236/jis.2015.63017
6,320
Downloads
7,899
Views
Citations
Design and Implementation of Multilevel Access Control in Synchronized Audio to Audio Steganography Using Symmetric Polynomial Scheme
(Articles)
Jeddy Nafeesa Begum
,
Krishnan Kumar
,
Vembu Sumathy
Journal of Information Security
Vol.1 No.1
,July 30, 2010
DOI:
10.4236/jis.2010.11004
4,768
Downloads
9,459
Views
Citations
A Secure Transfer of Identification Information in Medical Images by Steganocryptography
(Articles)
Shuhong Jiao
,
Robert Goutte
Int'l J. of Communications, Network and System Sciences
Vol.3 No.10
,October 27, 2010
DOI:
10.4236/ijcns.2010.310107
6,648
Downloads
11,035
Views
Citations
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis
(Articles)
John Babu
,
Sridevi Rangu
,
Pradyusha Manogna
Journal of Information Security
Vol.8 No.3
,July 14, 2017
DOI:
10.4236/jis.2017.83013
2,033
Downloads
4,901
Views
Citations
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
(Articles)
Ashraful Tauhid
,
Maisha Tasnim
,
Saima Arifin Noor
,
Nuruzzaman Faruqui
,
Mohammad Abu Yousuf
Journal of Information Security
Vol.10 No.3
,July 2, 2019
DOI:
10.4236/jis.2019.103007
1,195
Downloads
4,121
Views
Citations
This article belongs to the Special Issue on
Security and Cryptography
From Audio Branding to Sound Trademark: A Comparative Study in the EU and the US
(Articles)
Xinyu Zhang
Beijing Law Review
Vol.12 No.2
,April 26, 2021
DOI:
10.4236/blr.2021.122023
577
Downloads
2,982
Views
Citations
ContSteg: Contourlet-Based Steganography Method
(Articles)
Hedieh SAJEDI
,
Mansour JAMZAD
Wireless Sensor Network
Vol.1 No.3
,October 15, 2009
DOI:
10.4236/wsn.2009.13022
6,429
Downloads
11,960
Views
Citations
Hiding data in DNA of living organisms
(Articles)
Shu-Hong Jiao
,
Robert Goutte
Natural Science
Vol.1 No.3
,December 15, 2009
DOI:
10.4236/ns.2009.13023
6,145
Downloads
12,053
Views
Citations
A New Steganography Method Based on the Complex Pixels
(Articles)
Amin Hashemi Pour
,
Ali Payandeh
Journal of Information Security
Vol.3 No.3
,July 25, 2012
DOI:
10.4236/jis.2012.33025
4,523
Downloads
8,209
Views
Citations
A Simple Steganography Algorithm Based on Lossless Compression Technique in WSN
(Articles)
R. Vijayarajeswari
,
A. Rajivkannan
,
J. Santhosh
Circuits and Systems
Vol.7 No.8
,June 9, 2016
DOI:
10.4236/cs.2016.78117
1,980
Downloads
3,179
Views
Citations
Identity-Based Steganography in Spatial Domain
(Articles)
Xuba Xu
,
Qiankai Nie
Journal of Computer and Communications
Vol.6 No.3
,March 23, 2018
DOI:
10.4236/jcc.2018.63005
753
Downloads
1,705
Views
Citations
Countermeasure against Deepfake Using Steganography and Facial Detection
(Articles)
Kyle Corcoran
,
Jacob Ressler
,
Ye Zhu
Journal of Computer and Communications
Vol.9 No.9
,September 30, 2021
DOI:
10.4236/jcc.2021.99009
248
Downloads
1,572
Views
Citations
Review of Algorithms for Securing Data Transmission in Mobile Banking
(Articles)
Daniel Okari Orucho
,
Fredrick Mzee Awuor
,
Ratemo Makiya
,
Collins Oduor
Modern Economy
Vol.14 No.9
,September 15, 2023
DOI:
10.4236/me.2023.149062
102
Downloads
690
Views
Citations
MAP-based Audio Coding Compensation for Speaker Recognition
(Articles)
Tao Jiang
,
Jiqing Han
Journal of Signal and Information Processing
Vol.2 No.3
,August 12, 2011
DOI:
10.4236/jsip.2011.23021
5,947
Downloads
9,322
Views
Citations
ESL Learners’ Perceptions on English Subtitled Audio-Visual Materials
(Articles)
Farah Aina Anas
,
Nur Yasmin Khairani Zakaria
Creative Education
Vol.10 No.12
,November 28, 2019
DOI:
10.4236/ce.2019.1012206
819
Downloads
3,503
Views
Citations
This article belongs to the Special Issue on
Teaching and Learning
Enhancements in the Security Level for Wireless Sensor Network
(Articles)
Amr M. Kishk
,
Nagy W. Messiha
,
Nawal A. El-Fishawy
,
Abd-Elrahman A. Alkafs
,
Ahmed H. Madian
Journal of Information Security
Vol.6 No.3
,June 30, 2015
DOI:
10.4236/jis.2015.63022
4,545
Downloads
5,533
Views
Citations
How Do Patients Prefer to Receive Patient Education Material about Treatment, Diagnosis and Procedures?
—A Survey Study of Patients Preferences Regarding Forms of Patient Education Materials; Leaflets, Podcasts, and Video
(Articles)
Anna Krontoft
Open Journal of Nursing
Vol.11 No.10
,October 9, 2021
DOI:
10.4236/ojn.2021.1110068
322
Downloads
2,580
Views
Citations
This article belongs to the Special Issue on
Social Media, Communication and Technology in Nursing
Quantum Steganography Embedded Any Secret Text without Changing the Content of Cover Data
(Articles)
Takashi Mihara
Journal of Quantum Information Science
Vol.2 No.1
,March 28, 2012
DOI:
10.4236/jqis.2012.21003
5,799
Downloads
11,281
Views
Citations
A Robust Method to Detect Hidden Data from Digital Images
(Articles)
Romany F. Mansour
,
W. F. Awwad
,
A. A. Mohammed
Journal of Information Security
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/jis.2012.32011
12,081
Downloads
20,607
Views
Citations
A Secure Robust Gray Scale Image Steganography Using Image Segmentation
(Articles)
Mohammed J. Bawaneh
,
Atef A. Obeidat
Journal of Information Security
Vol.7 No.3
,April 11, 2016
DOI:
10.4236/jis.2016.73011
3,817
Downloads
6,435
Views
Citations
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top