Results 1 to 10 of about 8,564 (282)

Convolutional Neural Network Steganalysis's Application to Steganography [PDF]

open access: yes2017 IEEE Visual Communications and Image Processing (VCIP), 2017
This paper presents a novel approach to increase the performance bounds of image steganography under the criteria of minimizing distortion. The proposed approach utilizes a steganalysis convolutional neural network (CNN) framework to understand an image ...
Agarwal, Chirag   +3 more
core   +2 more sources

The Obfuscated Network Steganography

open access: yesIEEE Access
Network header steganography is a specialized field of steganography that focuses on embedding hidden data within network headers rather than the payload of a communication.
da-Chih Lin, Shang-Yu Chou
doaj   +2 more sources

AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography [PDF]

open access: yesEntropy
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant ...
Haiju Fan, Changyuan Jin, Ming Li
doaj   +2 more sources

Multi-Level Steganography: Improving Hidden Communication in Networks

open access: yes, 2012
The paper presents Multi-Level Steganography (MLS), which defines a new concept for hidden communication in telecommunication networks. In MLS, at least two steganographic methods are utilised simultaneously, in such a way that one method (called the ...
Fraczek, Wojciech   +2 more
core   +3 more sources

ARPNetSteg: Network Steganography Using Address Resolution Protocol [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of
Punam Bedi, Arti Dua
doaj   +1 more source

Generative Steganography Network

open access: yesProceedings of the 30th ACM International Conference on Multimedia, 2022
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly without cover media. However, existing GS schemes are often criticized for their poor performances.
Wei, Ping   +5 more
openaire   +2 more sources

Steganography of Steganographic Networks

open access: yesProceedings of the AAAI Conference on Artificial Intelligence, 2023
Steganography is a technique for covert communication between two parties. With the rapid development of deep neural networks (DNN), more and more steganographic networks are proposed recently, which are shown to be promising to achieve good performance.
Li, Guobiao   +4 more
openaire   +2 more sources

Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network

open access: yesSINTECH (Science and Information Technology) Journal, 2023
In the era of information technology, it is very important to protect data and information so that irresponsible parties do not misuse it. One technique for securing data is steganography. Steganography is a technique of hiding messages in a medium.
Khairunnisak Khairunnisak   +2 more
doaj   +1 more source

A Walk-through towards Network Steganography Techniques

open access: yesИнформатика и автоматизация, 2023
2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data
Urmila Pilania   +3 more
doaj   +1 more source

Toward network steganography detection [PDF]

open access: yesTelecommunication Systems, 2010
Network steganography is a recently introduced, general term which describes all information hiding methods that may be used to hide secret data in the normal data transmissions of users. While sending encrypted information, enabled by some cryptographic algorithm, protects messages from being captured by unauthorized parties, steganographic techniques
Szczypiorski, Krzysztof   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy