Results 41 to 50 of about 8,564 (282)

Multilevel Network Steganography in Fountain Codes [PDF]

open access: yesEuropean Interdisciplinary Cybersecurity Conference, 2021
We present a method to establish a network storage covert channel in a fountain code, which is used to provide reliable communication over lossy network with low overhead and without acknowledgment. As also parts of the secret message get lost when a carrier packet is lost, reliable transmission of the secret message is provided by using a second ...
openaire   +1 more source

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan   +5 more
doaj   +1 more source

Analysis of Reversible Network Covert Channels

open access: yesIEEE Access, 2022
In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts.
Przemyslaw Szary   +3 more
doaj   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Towards steganography detection through network traffic visualisation [PDF]

open access: yes2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, 2012
8 pages, 11 ...
Mazurczyk, Wojciech   +2 more
openaire   +2 more sources

Steganography: a class of secure and robust algorithms [PDF]

open access: yes, 2011
This research work presents a new class of non-blind information hiding algorithms that are stego-secure and robust. They are based on some finite domains iterations having the Devaney's topological chaos property.
Bahi, Jacques M.   +2 more
core   +4 more sources

How Hidden Can Be Even More Hidden?

open access: yes, 2011
The paper presents Deep Hiding Techniques (DHTs) that define general techniques that can be applied to every network steganography method to improve its undetectability and make steganogram extraction harder to perform.
Fraczek, Wojciech   +2 more
core   +1 more source

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

High-Pass-Kernel-Driven Content-Adaptive Image Steganalysis Using Deep Learning

open access: yesMathematics, 2023
Digital images cannot be excluded as part of a popular choice of information representation. Covert information can be easily hidden using images.
Saurabh Agarwal   +2 more
doaj   +1 more source

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

open access: yes, 2015
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy