Results 31 to 40 of about 8,674 (276)
Securing Fixed Neural Network Steganography
Image steganography is the art of concealing secret information in images in a way that is imperceptible to unauthorized parties. Recent advances show that is possible to use a fixed neural network (FNN) for secret embedding and extraction. Such fixed neural network steganography (FNNS) achieves high steganographic performance without training the ...
Zicong Luo +4 more
openaire +2 more sources
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu +4 more
doaj +1 more source
The secure steganography for hiding images via GAN
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj +1 more source
COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj +1 more source
Steganography and Steganalysis in Voice over IP: A Review
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu +3 more
doaj +1 more source
Detection of Size Modulation Covert Channels Using Countermeasure Variation [PDF]
Network covert channels enable stealthy communications for malware and data exfiltration. For this reason, developing effective countermeasures for these threats is important for the protection of individuals and organizations.
Steffen Wendzel +3 more
doaj +3 more sources
SecMon: End-to-End Quality and Security Monitoring System [PDF]
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz +5 more
core +4 more sources
Perfect undetectability of network steganography
AbstractThe paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication. StegBlocks is a general approach for constructing methods of network steganography. In StegBlocks, one has to determine objects with defined properties, which will be used to transfer hidden messages.
Wojciech Fraczek, Krzysztof Szczypiorski
openaire +1 more source
Security in Wireless Sensor Networks: Issues and Challenges [PDF]
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core +3 more sources
On Importance of Steganographic Cost For Network Steganography
15 pages, 14 figures, 3 ...
Wojciech Mazurczyk +3 more
openaire +2 more sources

