Results 241 to 250 of about 8,587 (278)
Some of the next articles are maybe not open access.

Steganography in social networks

2017 Siberian Symposium on Data Science and Engineering (SSDSE), 2017
In this paper we propose a new method for hidden messages transmission in social networks, on the example of the network “Vkontakte”. It was proposed to use a graph structure of user's friends to embed a secret message. It was tested for robustness of this method to a statistical stegoanalysis.
openaire   +1 more source

Artificial neural network for steganography

Neural Computing and Applications, 2014
The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message.
Sabah Husien, Haitham Badi
openaire   +1 more source

Network Steganography

2015
A chapter introducing and discussing network steganography and information hiding applied to network flows.
L Caviglione, W Mazurczyk
openaire   +1 more source

Image Steganography Using Deep Neural Networks

2023
Steganography involves the use of hiding a secret or unknown message in a regular message. Steganography is commonly used in such a way that smaller messages are difficult to detect within a larger image’s noisy areas. In this chapter, we try to fit a color image in another image which is of the same size.
Reddy Madhavi K.   +5 more
openaire   +1 more source

Network Steganography Based on PVD Idea

2018 8th International Conference on Computer and Knowledge Engineering (ICCKE), 2018
Network steganography based on the packet length, is a branch of network steganographic methods that transfers intended message by modifying the length of the packets in the network. In this paper, a new network steganographic method based on the packets length is presented using the idea of embedding the message in the lengths differences of the ...
Vajiheh Sabeti, Minoo Shoaei
openaire   +1 more source

A Steganography Scheme in P2P Network

2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008
With the extensive application of the peer-to-peer (P2P) network, the torrent file, a vital part of the BitTorrent P2P network, has become a very popular file format over the Internet. Through detailed analysis, we found that the torrent files are ideal host carriers of steganography.
Zishuai Li   +3 more
openaire   +1 more source

DNA-Based Steganography Using Neural Networks

2018 International Japan-Africa Conference on Electronics, Communications and Computations (JAC-ECC), 2018
Steganography is the art or the science of hiding information such as text, audio, video, etc. in another cover media such as text, audio, video and recently the information is hidden in deoxyribonucleic acid (DNA) sequences which have been become a cover medium for steganography.
Marghny H. Mohammed   +2 more
openaire   +1 more source

Behavior Steganography in Social Network

2016
Most modern steganographic techniques embed secret data into digital multimedia by slight modifying the cover data. This work proposes a novel steganographic scheme converting the secret data into the behaviors of individuals in social network, not the multimedia data. In the scheme, a sender makes “love” marks on the news published by his friends with
openaire   +1 more source

Joint adjustment image steganography networks

Signal Processing: Image Communication, 2023
Le Zhang, Yao Lu, Tong Li, Guangming Lu
openaire   +1 more source

Vectorial Compound Metapixels for Arbitrary Nonorthogonal Polarization Steganography

Advanced Materials, 2021
Zi-Lan Deng, Tan Shi, Xiangping Li
exaly  

Home - About - Disclaimer - Privacy