Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    AN APPROACH FOR IMAGE STEGANOGRAPHY AND STEGANALYSIS USING REGRESSIVE STUDENT PSYCHOLOGY OPTIMIZATION-ENABLED DEEP MAX-OUT NETWORK

  • articleNo Access

    A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm

  • articleNo Access

    OBJECT-BASED IMAGE STEGANOGRAPHY USING AFFINE TRANSFORMATION

  • articleFree Access

    Secure Error-Free Steganography for JPEG Images

  • articleNo Access

    SECURE IMAGE HIDING SCHEME BASED UPON VECTOR QUANTIZATION

  • articleNo Access

    HIDING IMAGES USING MODIFIED SEARCH-ORDER CODING AND MODULUS FUNCTION

  • articleNo Access

    An OMP Steganographic Algorithm Optimized by SFLA

  • articleNo Access

    A New Optimization Strategy for Solving the Fall-Off Boundary Value Problem in Pixel-Value Differencing Steganography

  • articleNo Access

    A Steganography Embedding Method Based on Hamming Coding and Histogram-Preserving

  • articleNo Access

    A Novel Steganography Algorithm Based on Quantization Table Modification and Image Scrambling in DCT Domain

  • articleNo Access

    REAL-TIME STEGANALYSIS OF LSB-REPLACEMENT IN DIGITAL AUDIO STREAMS

  • articleNo Access

    An Automated Security Approach of Video Steganography–Based LSB Using FPGA Implementation

  • articleNo Access

    Evolvable Hardware-Based Data Security System Using Image Steganography Through Dynamic Partial Reconfiguration

  • articleNo Access

    A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography

  • articleNo Access

    A FIRST CRYPTOSYSTEM FOR SECURITY OF TWO-DIMENSIONAL DATA

    Fractals01 Feb 2017
  • articleNo Access

    INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS

  • articleNo Access

    MODEL-BASED METHODS FOR STEGANOGRAPHY AND STEGANALYSIS

  • articleNo Access

    INVISIBLE CALIBRATION PATTERN FOR PRINT-AND-SCAN DATA HIDING BASED ON HUMAN VISUAL PERCEPTION

  • articleNo Access

    K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and Authentication

  • articleNo Access

    Crypto-stego System for Securing Text and Image Data