Language:
English
US
China
Cart
0
Login/Create Portal Account
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
All IGI Global Scholarly Journals Shift to Open Access
Following the first conversion of a portion of IGI Global’s hybrid open access/subscription-based journals to gold open access (OA) in 2021, and then again in 2022, IGI Global is pleased to announce that the remainder of their hybrid open access/subscription-based journal collection will officially convert to gold OA beginning January 1st, 2023.
Learn More
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Diversity, Equity, and Inclusion (DEI), Artificial Intelligence, Language Learning, Marketing and Customer Relations, Religious and Indigenous Studies, and more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make the publication, New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091), Fully Open Access, completely removing any paywall between researchers in education and the new models for the future of higher education.
Learn More
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a Collaboration between IGI Global and the University of North Texas, the Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054) has been published as Fully Open Access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Learn More
Books
Books
Open Access Books
OnDemand Book Chapters
Books by Subject
Business, Administration, & Management
Education
Science, Technology, & Medical (STM)
Books by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
Journals
Journals
OnDemand Journal Articles
Journals by Subject
Business, Administration, & Management
Education
Science, Technology, & Medical (STM)
Journals by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
e-Collections
Open Access
Open Access Publishing
Open Access Journals
Open Access Books
Retrospective Open Access
Open Access Agreements
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
What is Steganography
1.
It has many algorithms not just for having a secret message, but also to have a correct message. The way of embedding a confidential message in media (audio, text, image, video), without change in the host signal, and it is one of the essential ways to hide information.
Learn more in: DWT-Based Steganography for Image Transmission
2.
Associated to a data hiding technique for hiding an important message or secret data into digital media. The hidden data is not visible, and the image with the hidden data is called a stego-image.
Learn more in: Digital Watermarking Techniques
3.
It is a technique to provide security to the secret information using data hiding technique. In
steganography
, a cover media is selected to hide the information. Depending on the place of data hiding it is mainly divided into two categories: Spatial domain- if information is embedded directly in the pixel values and Transform domain- if information is embedded in the coefficient values which are calculated from the pixel values of the cover image.
Learn more in: Steganography Using Biometrics
4.
Steganography
is the art of concealed communication: the very existence of the message is a secret.
Steganography
is the study of techniques for hiding the existence of a secondary message in the presence of a primary message.
Learn more in: Digital Watermarking
5.
The technique to hide the secret message into the cover object to realized the covert communication without being found by the third part, which can conceal the existence of the communication itself.
Learn more in: Adaptive Image Steganography Based on Structural Similarity Metric
6.
An art of hiding some sensitive information into the insensitive features of host media.
Learn more in: Robust Steganography in Non-QRS Regions of 2D ECG for Securing Patients' Confidential Information in E-Healthcare Paradigm
7.
The art of concealing the original data within another data that acts as the carrier.
Learn more in: A Comparative Study on DNA-Based Cryptosystem
8.
Steganography
is a method to hide data in a cover media so that other persons will not notice that such data is there.
Learn more in: A Survey of Information Hiding
9.
This is an area where a signal (any kind of data) can be inserted into host signal (generally Image) to hide. Only host signal is visible after the process.
Learn more in: Utilizing Image Color Channels for High Payload Embedding
10.
The technology to realize secret communication by hiding secret information into such carrier as image, video, audio, text, computer program, and so forth. The carrier is public, while the existence of secret information is secret.
Learn more in: Multimedia Content Protection Technology
11.
Covered writing; it is a study of concealing the existence of a message.
Learn more in: Digital Watermarking and Steganography
12.
Watermarks may be for wide spread use. But a modification for that is
steganography
, where the transmitting end communicates a secret message embedded in the digital signal to the receiver. The main objective is to add owner descriptive information or any other form of authenticating information to the signal concerned, such that is difficult to remove. Moreover, to covert communication between individuals, some hidden embedded information could be used as well.
Learn more in: Watermarking of Data Using Biometrics
13.
The hiding of a secret message within a cover data and the extraction of secret message at its terminus.
Learn more in: Medical Data Security Tools and Techniques in E-Health Applications
14.
The art of hiding secret data inside other innocent media file.
Learn more in: Digital Steganography Based on Genetic Algorithm
15.
The art and science of writing hidden messages in such a way that no one apart from the sender and the intended recipient even realizes that there is a hidden message.
Learn more in: Anonymous Communications in Computer Networks
16.
A practice of concealing a file, image, message, or video within another one of such. From Greek portmanteau steganographia (steganós (ste?a???) – “covered or concealed”, graphia (??af?) – “writing”).
Learn more in: Universal Code of Movies and Influence of Traditional Media
17.
Steganography
is a class of information hiding that deals with concealing very the existence of the hidden message.
Learn more in: Critical Analysis of Digital Steganography
18.
The art and science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity.
Learn more in: Data Hiding Schemes Based on Singular Value Decomposition
19.
Techniques that allow secret communication, usually by embedding or hiding the secret information (called embedded data) in other, unsuspected data. Steganographic methods are based on the assumption that the existence of the covert communication is unknown and they are mainly used in secret point-to-point communication between trusting parties. As a result, steganographic methods are usually not robust, that is the hidden information cannot be recovered after data manipulation.
Learn more in: Music Score Watermarking
20.
A technique that aims to hide information or files inside an electronic file so that no one suspects such files or information is being delivered.
Learn more in: Crime Hidden in Email Spam
Find more terms and definitions using our
Dictionary Search
.
Steganography
appears in:
Ethical Hacking Techniques and Countermeasures...
Search inside this book for more research materials.
Recommend to a Librarian
Recommend to a Colleague
Looking for research materials? Search our database for more
Steganography
downloadable research papers.
InfoSci-OnDemand
Download Premium Research Papers
Full text search our database of 176,600 titles for
Steganography
to find related research papers.
Learn More About Steganography in These Related Titles
Handbook of Research on Clinical Application...
Medicine & Healthcare
Copyright 2020. 1356 pages.
In the past, individuals in the dentistry field ha...
In Stock
$29.50 Individual Chapters
Theory and Practice of Business Intelligence...
Medicine & Healthcare
Copyright 2020. 322 pages.
Business intelligence supports managers in enterpr...
In Stock
$29.50 Individual Chapters
Handbook of Research on the Global Impacts a...
Media & Communications
Copyright 2020. 539 pages.
The world is witnessing a media revolution similar...
In Stock
$29.50 Individual Chapters
Research-Based Perspectives on the Psychophy...
Medicine & Healthcare
Copyright 2018. 456 pages.
Yoga has evolved into a popular fitness practice a...
In Stock
$29.50 Individual Chapters
Cloud Computing Systems and Applications in...
Medicine & Healthcare
Copyright 2017. 282 pages.
The implementation of cloud technologies in health...
In Stock
$29.50 Individual Chapters
Handbook of Research on Computerized Occlusa...
Medicine & Healthcare
Copyright 2015. 973 pages.
Modern medicine is changing drastically as new tec...
In Stock
$29.50 Individual Chapters
Educational, Psychological, and Behavioral C...
Media & Communications
Copyright 2014. 465 pages.
Online communities continue to evolve as more peop...
In Stock
$29.50 Individual Chapters
Gaze Interaction and Applications of Eye Tra...
Medicine & Healthcare
Copyright 2012. 382 pages.
Recent advances in eye tracking technology will al...
In Stock
$29.50 Individual Chapters
Implementing Information Technology Governan...
Library & Information Science
Copyright 2008. 270 pages.
In many organizations, information technology (IT)...
In Stock
$29.50 Individual Chapters
Global Perspective of Information Technology...
Computer Science & IT
Copyright 2002. 334 pages.
Managing information technology (IT) on a global s...
In Stock
$29.50 Individual Chapters