Results 21 to 30 of about 8,674 (276)
Robust Image Steganography Based on Prior Distribution Resistant to JPEG Compression [PDF]
Because the compression process of the network channel is unknown, attacks on the image after social network transmission are difficult to predict. Therefore, studying the steganography algorithm resistant to the compression distortion of a channel is ...
LIU Ting, DONG Li, YAN Diqun, WANG Rangding
doaj +1 more source
Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj +1 more source
Using Transcoding for Hidden Communication in IP Telephony [PDF]
The paper presents a new steganographic method for IP telephony called TranSteg (Transcoding Steganography). Typically, in steganographic communication it is advised for covert data to be compressed in order to limit its size. In TranSteg it is the overt
Mazurczyk, Wojciech +2 more
core +2 more sources
New security and control protocol for VoIP based on steganography and digital watermarking [PDF]
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core +3 more sources
Steganography GAN: Cracking Steganography with Cycle Generative Adversarial Networks
For as long as humans have participated in the act of communication, concealing information in those communicative mediums has manifested into an art of its own. Crytographic messages, through written language or images, are a means of concealment, usually reserved for highly sensitive or compromising information.
Nibraas Khan +4 more
openaire +2 more sources
Adaptive Image Steganography Against JPEG Compression [PDF]
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj +1 more source
Detecting fingerprints of audio steganography software
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong +5 more
doaj +1 more source
Multilevel Network Steganography in Fountain Codes [PDF]
We present a method to establish a network storage covert channel in a fountain code, which is used to provide reliable communication over lossy network with low overhead and without acknowledgment. As also parts of the secret message get lost when a carrier packet is lost, reliable transmission of the secret message is provided by using a second ...
openaire +1 more source
StegoPNet: Image Steganography With Generalization Ability Based on Pyramid Pooling Module
In terms of payload capacity and visual effects, the existing image steganography technology based on deep neural networks still needs improvement, to solve this problem, this article proposes a new deep convolutional steganography network based on the ...
Xintao Duan +5 more
doaj +1 more source
Over the last several years, various researchers have been driven to the challenge of addressing security issues in Wireless Sensor Networks (WSN). Steganography is one of the most secure encryption techniques used for network security around the globe ...
Ambika +2 more
doaj +1 more source

