Results 41 to 50 of about 8,587 (278)

Multilevel Network Steganography in Fountain Codes [PDF]

open access: yesEuropean Interdisciplinary Cybersecurity Conference, 2021
We present a method to establish a network storage covert channel in a fountain code, which is used to provide reliable communication over lossy network with low overhead and without acknowledgment. As also parts of the secret message get lost when a carrier packet is lost, reliable transmission of the secret message is provided by using a second ...
openaire   +1 more source

Analysis of Reversible Network Covert Channels

open access: yesIEEE Access, 2022
In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts.
Przemyslaw Szary   +3 more
doaj   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Towards steganography detection through network traffic visualisation [PDF]

open access: yes2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, 2012
8 pages, 11 ...
Mazurczyk, Wojciech   +2 more
openaire   +2 more sources

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan   +5 more
doaj   +1 more source

How Hidden Can Be Even More Hidden?

open access: yes, 2011
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech   +2 more
core   +1 more source

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

open access: yes, 2015
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg   +3 more
core   +1 more source

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

High-Pass-Kernel-Driven Content-Adaptive Image Steganalysis Using Deep Learning

open access: yesMathematics, 2023
Digital images cannot be excluded as part of a popular choice of information representation. Covert information can be easily hidden using images.
Saurabh Agarwal   +2 more
doaj   +1 more source

Incidence and Risk Factors of Serious Osteonecrosis in Pediatric Acute Lymphoblastic Leukemia: A CYP‐C Population‐Based Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Osteonecrosis (ON) is a debilitating complication of acute lymphoblastic leukemia (ALL) therapy. While numerous studies have explored its incidence and associated risk factors, investigations using large‐scale cohorts remain important to characterize ON across heterogeneous populations.
Noémie de Villiers   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy