Steganographic Method with Code Control of Information Embedding Based on Multi-level Code Words
-
Published:2023-04
Issue:4
Volume:66
Page:173-189
-
ISSN:0735-2727
-
Container-title:Radioelectronics and Communications Systems
-
language:en
-
Short-container-title:Radioelectron.Commun.Syst.
Author:
Kobozeva A. A.ORCID,
Sokolov A. V.ORCID
Reference22 articles.
1. A. A. Kobozeva, V. A. Horoshko, Information Security Analysis (Izd. GUIKT, Kiev, 2009).
2. A. K. Bairagi, R. Khondoker, R. Islam, "An efficient steganographic approach for protecting communication in the Internet of Things (IoT) critical infrastructures," Inf. Secur. J. A Glob. Perspect., v.25, n.4–6, p.197 (2016). DOI: https://doi.org/10.1080/19393555.2016.1206640.
3. I. Hussain, M. C. Negi, N. Pandey, "Security in ZigBee using steganography for IoT communications," in System Performance and Management Analytics (Springer, 2019). DOI: https://doi.org/10.1007/978-981-10-7323-6_18.
4. D. Stanescu, V. Stangaciu, M. Stratulat, "Steganography on new generation of mobile phones with image and video processing abilities," in 2010 International Joint Conference on Computational Cybernetics and Technical Informatics (IEEE, 2010). DOI: https://doi.org/10.1109/ICCCYB.2010.5491253.
5. Z. Li, M. Zhang, J. Liu, "Robust image steganography framework based on generative adversarial network," J. Electron. Imaging, v.30, n.02 (2021). DOI: https://doi.org/10.1117/1.JEI.30.2.023006.