Results 31 to 40 of about 8,564 (282)

Steganography and Steganalysis in Voice over IP: A Review

open access: yesSensors, 2021
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu   +3 more
doaj   +1 more source

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

Detection of Size Modulation Covert Channels Using Countermeasure Variation [PDF]

open access: yesJournal of Universal Computer Science, 2019
Network covert channels enable stealthy communications for malware and data exfiltration. For this reason, developing effective countermeasures for these threats is important for the protection of individuals and organizations.
Steffen Wendzel   +3 more
doaj   +3 more sources

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions [PDF]

open access: yes, 1999
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Boudreau, Eric   +4 more
core   +3 more sources

Steganography of Complex Networks

open access: yes, 2021
Steganography is one of the information hiding techniques, which conceals secret messages in cover media. Digital image and audio are the most studied cover media for steganography. However, so far, there is no research on steganography to utilize complex networks as cover media.
openaire   +2 more sources

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

Steganography GAN: Cracking Steganography with Cycle Generative Adversarial Networks

open access: yes, 2020
For as long as humans have participated in the act of communication, concealing information in those communicative mediums has manifested into an art of its own. Crytographic messages, through written language or images, are a means of concealment, usually reserved for highly sensitive or compromising information.
Khan, Nibraas   +4 more
openaire   +2 more sources

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

Behavioral Steganography in Social Networks

open access: yesTürk Doğa ve Fen Dergisi, 2022
Recently, using human behavior to hide the existence of information has been at the center of steganography research. In this study, a behavioral steganography algorithm using CMI (Coded Signal Inversion) coding is proposed to minimize the high bit error rate that occurs when transmitting a large number of continuous and identical confidential ...
openaire   +2 more sources

Trends Toward Real-Time Network Data Steganography

open access: yesInternational Journal of Network Security & Its Applications, 2016
Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and ...
Collins, James, Agaian, Sos
openaire   +2 more sources

Home - About - Disclaimer - Privacy