Results 31 to 40 of about 8,674 (276)

Securing Fixed Neural Network Steganography

open access: yesProceedings of the 31st ACM International Conference on Multimedia, 2023
Image steganography is the art of concealing secret information in images in a way that is imperceptible to unauthorized parties. Recent advances show that is possible to use a fixed neural network (FNN) for secret embedding and extraction. Such fixed neural network steganography (FNNS) achieves high steganographic performance without training the ...
Zicong Luo   +4 more
openaire   +2 more sources

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

The secure steganography for hiding images via GAN

open access: yesEURASIP Journal on Image and Video Processing, 2020
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj   +1 more source

COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj   +1 more source

Steganography and Steganalysis in Voice over IP: A Review

open access: yesSensors, 2021
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu   +3 more
doaj   +1 more source

Detection of Size Modulation Covert Channels Using Countermeasure Variation [PDF]

open access: yesJournal of Universal Computer Science, 2019
Network covert channels enable stealthy communications for malware and data exfiltration. For this reason, developing effective countermeasures for these threats is important for the protection of individuals and organizations.
Steffen Wendzel   +3 more
doaj   +3 more sources

SecMon: End-to-End Quality and Security Monitoring System [PDF]

open access: yes, 2008
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz   +5 more
core   +4 more sources

Perfect undetectability of network steganography

open access: yesSecurity and Communication Networks, 2016
AbstractThe paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication. StegBlocks is a general approach for constructing methods of network steganography. In StegBlocks, one has to determine objects with defined properties, which will be used to transfer hidden messages.
Wojciech Fraczek, Krzysztof Szczypiorski
openaire   +1 more source

Security in Wireless Sensor Networks: Issues and Challenges [PDF]

open access: yes, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military.
Delic, H, Ersoy, C, Onel, T, Onur, Ertan
core   +3 more sources

On Importance of Steganographic Cost For Network Steganography

open access: yesCoRR, 2014
15 pages, 14 figures, 3 ...
Wojciech Mazurczyk   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy