Results 241 to 250 of about 8,674 (276)
Some of the next articles are maybe not open access.

A Steganography Scheme in P2P Network

2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2008
With the extensive application of the peer-to-peer (P2P) network, the torrent file, a vital part of the BitTorrent P2P network, has become a very popular file format over the Internet. Through detailed analysis, we found that the torrent files are ideal host carriers of steganography.
Zishuai Li   +3 more
openaire   +1 more source

A Discussion and Review of Network Steganography

2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 2016
Network steganography or covert channel allows one to initiate secret communication with the hope that such communication cannot be detected by adversaries. It appears to be a favourable tool that could bring the next level of communication secrecy for everyone.
Jun O. Seo   +2 more
openaire   +1 more source

Artificial neural network for steganography

Neural Computing and Applications, 2014
The digital information revolution has brought about changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. The strength of the information hiding science is due to the nonexistence of standard algorithms to be used in hiding secret message.
Sabah Husien, Haitham Sabah Badi
openaire   +1 more source

Steganography Detection by Means of Neural Networks

2008 19th International Conference on Database and Expert Systems Applications, 2008
Cryptography is one of very much spoken word nowadays. Security of messages transfer is very important and specialists have a work to think a new cryptography up. Cryptography, on the other hand, can be and is very often used by jailbirds, so cryptanalysts have also very important job to detect and reveal and then decode the coded messages ...
Zuzana Oplatková   +3 more
openaire   +2 more sources

Destroying robust steganography in online social networks

Information Sciences, 2021
Abstract In recent years, some robust steganography approaches for covert transmission in online social networks (OSNs) have been proposed. Some existing image algorithms, such as watermarking removal methods, have been developed to remove the hidden messages that might exist in an uploaded image.
Zhiying Zhu 0001   +3 more
openaire   +1 more source

Steganography in social networks

2017 Siberian Symposium on Data Science and Engineering (SSDSE), 2017
In this paper we propose a new method for hidden messages transmission in social networks, on the example of the network “Vkontakte”. It was proposed to use a graph structure of user's friends to embed a secret message. It was tested for robustness of this method to a statistical stegoanalysis.
openaire   +1 more source

Steg Blocks: Ensuring Perfect Undetectability of Network Steganography

open access: yesCoRR, 2015
6 pages, 1 figure, Accepted to Fourth International Workshop on Cyber Crime (IWCC 2015), co-located with 10th International Conference on Availability, Reliability and Security (ARES 2015), Toulouse, France, 24-28 August ...
Krzysztof Szczypiorski
exaly   +3 more sources

Network Steganography

2015
A chapter introducing and discussing network steganography and information hiding applied to network flows.
L Caviglione, W Mazurczyk
openaire   +1 more source

Cryptographic-steganography network communication

2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), 2017
Data security is vital for any firm as the automation of data transferring improves efficiency and productivity. The proposed software not only ensures data security but also serves as an important and effective tool in the efficient functioning of an organization.
Reshmi Vijayan, R. S. Sreedivya
openaire   +1 more source

Optical steganography for data hiding in optical networks

2009 16th International Conference on Digital Signal Processing, 2009
Optical steganography for data-hiding is experimentally demonstrated using group velocity dispersion in an optical network. A stealth channel is temporally and spectrally hidden underneath a public channel. Our technique applies to several different types of optical systems including optical code division and wavelength division multiplexing.
Paul R. Prucnal   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy