Results 41 to 50 of about 8,564 (282)
Multilevel Network Steganography in Fountain Codes [PDF]
We present a method to establish a network storage covert channel in a fountain code, which is used to provide reliable communication over lossy network with low overhead and without acknowledgment. As also parts of the secret message get lost when a carrier packet is lost, reliable transmission of the secret message is provided by using a second ...
openaire +1 more source
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan +5 more
doaj +1 more source
Analysis of Reversible Network Covert Channels
In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts.
Przemyslaw Szary +3 more
doaj +1 more source
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Towards steganography detection through network traffic visualisation [PDF]
8 pages, 11 ...
Mazurczyk, Wojciech +2 more
openaire +2 more sources
Steganography: a class of secure and robust algorithms [PDF]
This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property.
Bahi, Jacques M. +2 more
core +4 more sources
How Hidden Can Be Even More Hidden?
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech +2 more
core +1 more source
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source
High-Pass-Kernel-Driven Content-Adaptive Image Steganalysis Using Deep Learning
Digital images cannot be excluded as part of a popular choice of information representation. Covert information can be easily hidden using images.
Saurabh Agarwal +2 more
doaj +1 more source
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg +3 more
core +1 more source

