Results 31 to 40 of about 15,292 (300)
ARPNetSteg: Network Steganography Using Address Resolution Protocol [PDF]
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of
Punam Bedi, Arti Dua
doaj +1 more source
Edge-based image steganography [PDF]
This paper proposes a novel steganography technique, where edges in the cover image have been used to embed messages. Amount of data to be embedded plays an important role on the selection of edges, i.e., the more the amount of data to be embedded, larger the use of weaker edges for embedding. Experimental results have shown that the proposed technique
Saiful Islam +2 more
openaire +1 more source
Latest Trends in Deep Learning Techniques for Image Steganography
The development of deep convolutional neural networks has been largely responsible for the significant strides forward made in steganography over the past decade.
Vijay Kumar +3 more
semanticscholar +1 more source
DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models [PDF]
Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image.
Yiwei Yang +7 more
semanticscholar +1 more source
Steganograhy in Images by Using Intersecting Planes [PDF]
Steganography is the art of hiding, and transmitting information using apparently innocent carrier without expose any suspicion. In this paper the proposed system is an implementation of image steganography techniques.
Esraa Jaffar Baker
doaj +1 more source
Image Steganography in Wavelet Domain [PDF]
Steganography is the science of hiding secret data within any kind of medium such as image, video, audio and document. The two main category of image steganography are spatial-based embedding and transform-based embedding.
Aisha Elkafrawy +2 more
doaj +1 more source
Pixel steganography method for grayscale image steganography on colour images
The process of hiding secret data within a host signal is known as steganography; its design parameters are imperceptibility, concealment capacity, and recovered data quality. A case of images, one of the existing methods based on modification of the host image pixels is called Block Pixel Hiding Method (BPHM), which has good imperceptibility and high ...
Hadi Hussein Madhi +3 more
openaire +1 more source
In all forms of confidential communication, the most significant element is security. Cryptography can be used to secure the information, but it discloses the presence of covert communication. Hence, steganography was invented; steganography is an art of
Pratik D. Shah, Rajankumar S. Bichkar
doaj +1 more source
JPEG steganography: A performance evaluation of quantization tables [PDF]
The two most important aspects of any image based steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG ...
Al-Mohammad, A, Ghinea, G, Hierons, RM
core +1 more source
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source

