Results 41 to 50 of about 8,674 (276)
Invisible steganography via generative adversarial networks [PDF]
13 pages, 7 ...
Ru Zhang, Shiqi Dong, Jianyi Liu
openaire +2 more sources
Analysis of Reversible Network Covert Channels
In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts.
Przemyslaw Szary +3 more
doaj +1 more source
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Review on DNA Cryptography [PDF]
Cryptography is the science that secures data and communication over the network by applying mathematics and logic to design strong encryption methods.
Mondal, Mandrita, Ray, Kumar S.
core +3 more sources
Using Facebook for Image Steganography
Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held ...
Dakve, Tejas +3 more
core +1 more source
Towards Steganography Detection Through Network Traffic Visualisation
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz +2 more
core +1 more source
MoveSteg: A Method of Network Steganography Detection
Abstract This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods.
Krzysztof Szczypiorski, Tomasz Tyl
openaire +2 more sources
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source
High-Pass-Kernel-Driven Content-Adaptive Image Steganalysis Using Deep Learning
Digital images cannot be excluded as part of a popular choice of information representation. Covert information can be easily hidden using images.
Saurabh Agarwal +2 more
doaj +1 more source
Bayesian Neural Networks for Reversible Steganography
Recent advances in deep learning have led to a paradigm shift in the field of reversible steganography. A fundamental pillar of reversible steganography is predictive modelling which can be realised via deep neural networks. However, non-trivial errors exist in inferences about some out-of-distribution and noisy data.
openaire +3 more sources

