Results 241 to 250 of about 8,587 (278)
Some of the next articles are maybe not open access.
Steganography in social networks
2017 Siberian Symposium on Data Science and Engineering (SSDSE), 2017In this paper we propose a new method for hidden messages transmission in social networks, on the example of the network “Vkontakte”. It was proposed to use a graph structure of user's friends to embed a secret message. It was tested for robustness of this method to a statistical stegoanalysis.
openaire +1 more source
Artificial neural network for steganography
Neural Computing and Applications, 2014The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message.
Sabah Husien, Haitham Badi
openaire +1 more source
2015
A chapter introducing and discussing network steganography and information hiding applied to network flows.
L Caviglione, W Mazurczyk
openaire +1 more source
A chapter introducing and discussing network steganography and information hiding applied to network flows.
L Caviglione, W Mazurczyk
openaire +1 more source
Image Steganography Using Deep Neural Networks
2023Steganography involves the use of hiding a secret or unknown message in a regular message. Steganography is commonly used in such a way that smaller messages are difficult to detect within a larger image’s noisy areas. In this chapter, we try to fit a color image in another image which is of the same size.
Reddy Madhavi K. +5 more
openaire +1 more source
Network Steganography Based on PVD Idea
2018 8th International Conference on Computer and Knowledge Engineering (ICCKE), 2018Network steganography based on the packet length, is a branch of network steganographic methods that transfers intended message by modifying the length of the packets in the network. In this paper, a new network steganographic method based on the packets length is presented using the idea of embedding the message in the lengths differences of the ...
Vajiheh Sabeti, Minoo Shoaei
openaire +1 more source
A Steganography Scheme in P2P Network
2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008With the extensive application of the peer-to-peer (P2P) network, the torrent file, a vital part of the BitTorrent P2P network, has become a very popular file format over the Internet. Through detailed analysis, we found that the torrent files are ideal host carriers of steganography.
Zishuai Li +3 more
openaire +1 more source
DNA-Based Steganography Using Neural Networks
2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC), 2018Steganography is the art or the science of hiding information such as text, audio, video, etc. in another cover media such as text, audio, video and recently the information is hidden in deoxyribonucleic acid (DNA) sequences which have been become a cover medium for steganography.
Marghny H. Mohammed +2 more
openaire +1 more source
Behavior Steganography in Social Network
2016Most modern steganographic techniques embed secret data into digital multimedia by slight modifying the cover data. This work proposes a novel steganographic scheme converting the secret data into the behaviors of individuals in social network, not the multimedia data. In the scheme, a sender makes “love” marks on the news published by his friends with
openaire +1 more source
Joint adjustment image steganography networks
Signal Processing: Image Communication, 2023Le Zhang, Yao Lu, Tong Li, Guangming Lu
openaire +1 more source
Vectorial Compound Metapixels for Arbitrary Nonorthogonal Polarization Steganography
Advanced Materials, 2021Zi-Lan Deng, Tan Shi, Xiangping Li
exaly

