Results 41 to 50 of about 8,674 (276)

Invisible steganography via generative adversarial networks [PDF]

open access: yesMultimedia Tools and Applications, 2018
13 pages, 7 ...
Ru Zhang, Shiqi Dong, Jianyi Liu
openaire   +2 more sources

Analysis of Reversible Network Covert Channels

open access: yesIEEE Access, 2022
In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts.
Przemyslaw Szary   +3 more
doaj   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Review on DNA Cryptography [PDF]

open access: yes, 2019
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core   +3 more sources

Using Facebook for Image Steganography

open access: yes, 2015
Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held ...
Dakve, Tejas   +3 more
core   +1 more source

Towards Steganography Detection Through Network Traffic Visualisation

open access: yes, 2012
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz   +2 more
core   +1 more source

MoveSteg: A Method of Network Steganography Detection

open access: yesInternational Journal of Electronics and Telecommunications, 2016
Abstract This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods.
Krzysztof Szczypiorski, Tomasz Tyl
openaire   +2 more sources

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

High-Pass-Kernel-Driven Content-Adaptive Image Steganalysis Using Deep Learning

open access: yesMathematics, 2023
Digital images cannot be excluded as part of a popular choice of information representation. Covert information can be easily hidden using images.
Saurabh Agarwal   +2 more
doaj   +1 more source

Bayesian Neural Networks for Reversible Steganography

open access: yesIEEE Access, 2022
Recent advances in deep learning have led to a paradigm shift in the field of reversible steganography. A fundamental pillar of reversible steganography is predictive modelling which can be realised via deep neural networks. However, non-trivial errors exist in inferences about some out-of-distribution and noisy data.
openaire   +3 more sources

Home - About - Disclaimer - Privacy