Results 21 to 30 of about 8,674 (276)

Robust Image Steganography Based on Prior Distribution Resistant to JPEG Compression [PDF]

open access: yesJisuanji gongcheng
Because the compression process of the network channel is unknown, attacks on the image after social network transmission are difficult to predict. Therefore, studying the steganography algorithm resistant to the compression distortion of a channel is ...
LIU Ting, DONG Li, YAN Diqun, WANG Rangding
doaj   +1 more source

Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]

open access: yesEngineering and Technology Journal, 2016
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj   +1 more source

Using Transcoding for Hidden Communication in IP Telephony [PDF]

open access: yes, 2011
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech   +2 more
core   +2 more sources

New security and control protocol for VoIP based on steganography and digital watermarking [PDF]

open access: yes, 2006
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core   +3 more sources

Steganography GAN: Cracking Steganography with Cycle Generative Adversarial Networks

open access: yesCoRR, 2020
For as long as humans have participated in the act of communication, concealing information in those communicative mediums has manifested into an art of its own. Crytographic messages, through written language or images, are a means of concealment, usually reserved for highly sensitive or compromising information.
Nibraas Khan   +4 more
openaire   +2 more sources

Adaptive Image Steganography Against JPEG Compression [PDF]

open access: yesJisuanji kexue
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj   +1 more source

Detecting fingerprints of audio steganography software

open access: yesForensic Science International: Reports, 2020
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong   +5 more
doaj   +1 more source

Multilevel Network Steganography in Fountain Codes [PDF]

open access: yesEuropean Interdisciplinary Cybersecurity Conference, 2021
We present a method to establish a network storage covert channel in a fountain code, which is used to provide reliable communication over lossy network with low overhead and without acknowledgment. As also parts of the secret message get lost when a carrier packet is lost, reliable transmission of the secret message is provided by using a second ...
openaire   +1 more source

StegoPNet: Image Steganography With Generalization Ability Based on Pyramid Pooling Module

open access: yesIEEE Access, 2020
In terms of payload capacity and visual effects, the existing image steganography technology based on deep neural networks still needs improvement, to solve this problem, this article proposes a new deep convolutional steganography network based on the ...
Xintao Duan   +5 more
doaj   +1 more source

Secure communication over wireless sensor network using image steganography with generative adversarial networks

open access: yesMeasurement: Sensors, 2022
Over the last several years, various researchers have been driven to the challenge of addressing security issues in Wireless Sensor Networks (WSN). Steganography is one of the most secure encryption techniques used for network security around the globe ...
Ambika   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy