Multidisciplinary approach to modern digital steganography

"This book gives an insight to the different latest techniques and state-of-the-art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platform"--

Bibliographic Details
Other Authors: Pramanik, Sabyasachi, 1978-, Ghonge, Mangesh, 1984-, Ravi, Renjith, 1985-, Cengiz, Korhan
Format: eBook
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global, [2021]
Series:Advances in information security, privacy, and ethics (AISPE) book series.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
Table of Contents:
  • Chapter 1. Unseen to seen by digital steganography: modern-day data-hiding techniques
  • Chapter 2. Image steganography: recent trends and techniques
  • Chapter 3. Advances in text steganography theory and research: a critical review and gaps
  • Chapter 4. Machine learning and deep learning in steganography and steganalysis
  • Chapter 5. Multimode approach of data encryption in images through quantum steganography
  • Chapter 6. Detection of malicious spatial-domain steganography over noisy channels
  • Chapter 7. Secure text extraction from complex degraded images by applying steganography and deep learning
  • Chapter 8. Modern approaches to creating highly undetectable stegosystems (HUGO systems)
  • Chapter 9. IoT security using steganography
  • Chapter 10. An integration of keyless encryption, steganography, and artificial intelligence for the secure transmission of stego images
  • Chapter 11. Multimedia data protection using hybridized Crystal payload algorithm with chicken swarm optimization
  • Chapter 12. Secure framework data security using cryptography and steganography in Internet of things
  • Chapter 13. Application of steganography for secure data transmission using lossless compression
  • Chapter 14. Applications of machine learning in steganography for data protection and privacy
  • Chapter 15. Design and development of hybrid algorithms to improve cyber security and provide securing data using image steganography with Internet of things.