Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Towards Robust Image Steganography
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFH9snvTg1wSnU3rwItqtadPmBcZAhkO9uVWHp5K2iTvoJq77_03SdjgU8VZoEtr3kveR_PJ7ABeUqShlSNwMMdUJSiZckTPPRS6JYGYGWSLtKT68-I9jHA0bcL2-CyOltOAz2TWP9iw_X2Qrs1XW064lCChvQpNxr7yrtT4xoGiLielwgbio_Vh9QcbjvXg4eY4Nigu7PqJe3LjhhGxVlR-m2PqX0R5M6y-z4OpuCS4ptxk2UNc1feN_f2IfdquQ07kp58gBNOT8EHa-ERG24DK26NmlM16kq2Xh3L9rM-P0Z4NJIV_FvKK17vdmgyN4Gt3Gwzu3KqLgZj4PCy3-0PD5IFURxUgo4auASi-XgZARF9zPdc6lE1WeC8IV0jDNfMYUUfqNp7gXHIPDZCQxCvUIgaCmNocOCvKUEUGECkNftYHU4kyyilrcVLh4S2yK4fHEqiAxKkgqFbThat3noyTW-LN1y0hy3bISYhs6tdaSau0tE51kMW2pdC558nuvU9jWY_MSe92BreJzJc_KYhDndlJ9ATUGyBE
Ieee Transactions On Circuits And Systems For Video Technology, Volume 29, Issue 2, pp. 594 - 600
Journal Article : Full Text Online
-
Video steganography: A review
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LS8QwEA6LJy-uL3B90cNeY5v0kUSWhbVaxJtvPJU0Td0VqYvs_n8nTbKwIAoKvTRMoE2GmS_tN98gNExYk1WME6w4r-CAoiSWNYswF5pIZjyoE9J-5jcv9PaOF3kP5b4WxtAqXey3Mb2L1m4kdKsZzmez8D4SFE5RxOR4AqjcFPwCmjCeXVxerP4kMEKt3h5NsbH25XMdx6vVS8MZgSTIO7VTQb5PT5Yb2aWcoo9a_7Ad3_rM8k3sl4c1IrZXdPzne22jLQdOg4m120E93e6ivm_8ELg4sIeGT7NafwSj6Rh85FW2TvZ6FE7H58EksOUw--ixuHrIr7Frt4AVnBsWWEWC00QzxuNYRko1TVUBvEk50XWliKSphjTXMAMLMpEJnWgNeEbHQkmlKhkfoIDpTPMsbWBcJqaLB8CHumJEEtmkKW0GKPbLWyonQm56YbyXnm32VtpNKc2mlJGAiwwQXs2aWxGOX-yZ37lybdFLyBM_zjz888wjtAl3wtDTKD9GG4vPpT6xHSZOO4_8Ah3p6K4
Neurocomputing (Amsterdam), Volume 335, pp. 238 - 250
Journal Article : Full Text Online
-
CNN-Based Adversarial Embedding for Image Steganography
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFH9BvehBFExEkezgyTjo1nXtEkIiyCLGkCgY42lpt04Ogkbg_7ftOiKJMe60Q7t0772-93vt-wC4DGgeCso8N2VMKAcl5S7PKHJZJD1OtQSZQtov7P7Vf3xi8aAC15tcGCmlCT6Tbf1q7vKzj3Stj8o6LESY6czeHRqhIler1LrKqhdpb4SErnIysL3B9FDUmY7iiQ7iitrKu1Camm7ZINNUZVsTY2te4iq8lAszsdXtIrakOGXYCrouqzf-9x-O4NAiTuemEJFjqMhFDaplNwfHbu4aHPwoTViH3mA8dvvKxGWO6dm85FpSneFcyEybO0eBXWc0V9rI6c56k5V84wtb_brbmfVO4DkeTgd3ru214KYYhyvXJ5wGEkvqKTxGc6HWmCqkESEsifLQGMr1faUXCBwIIkJBtKuEMiZSKimVGJ-CQ2UoWUhyBXJ4oFt4KOyQCepxj-eE-HkDUEn2JLUVyHUjjPfEeCIoSjSnEs2pxHKqAVebKZ9F-Y2_Btc1vTcDLakb0Cx5m9gNukx8_RgAdvb7rHPY198uYv2asLv6WsuLomNEC_aGk_7tQ8tI4Dc_otUM
Ieee Transactions On Information Forensics And Security, Volume 14, Issue 8, pp. 2074 - 2087
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
-
Noiseless steganography : the key to covert communications
https://find.library.duke.edu/catalog/DUKE99119257898508501
Book : View Online
-
Investigator's guide to steganography
https://find.library.duke.edu/catalog/DUKE99119548093208501
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info