Results 121 to 130 of about 23,715 (170)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Video Based Steganography (Motion Vector Steganography)
Jurnal Teknik Indonesia, 2023Steganography is a technique for hiding information in digital media so that it cannot be detected by third parties. One effective steganography method is Motion Vector Steganography (MVS), which utilizes motion vectors in video compression to insert secret messages.
null Della Patresya Sitohang +3 more
openaire +1 more source
ACM SIGITE Newsletter, 2016
The MP4 files have become the most used video media file available, and will mostly likely remain at the top for some time to come. This makes MP4 files an interesting candidate for steganography. With its size and structure, it offers a challenge to steganography developers.
Anthony Ramirez, Alfredo Fernandez
openaire +1 more source
The MP4 files have become the most used video media file available, and will mostly likely remain at the top for some time to come. This makes MP4 files an interesting candidate for steganography. With its size and structure, it offers a challenge to steganography developers.
Anthony Ramirez, Alfredo Fernandez
openaire +1 more source
Compression‐based steganography
Concurrency and Computation: Practice and Experience, 2019SummaryConventional privacy‐enforcement mechanisms, such as encryption‐based ones, are frequently used to prevent third‐party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in ...
Carpentieri B. +4 more
openaire +2 more sources
Steganography and classification of image steganography techniques
2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire +1 more source
Proceedings of the 3rd annual conference on Information security curriculum development, 2006
Steganography is the art of concealing messages through hidden data that is embedded in a carrier medium. Current steganalysis practices focus on detecting and recovering these pieces of hidden data. This paper focuses on instances when neither detecting nor recovering data is desirable, but on proactively cleansing the cover media from possible ...
Guillermo A. Francia, Tyler S. Gomez
openaire +1 more source
Steganography is the art of concealing messages through hidden data that is embedded in a carrier medium. Current steganalysis practices focus on detecting and recovering these pieces of hidden data. This paper focuses on instances when neither detecting nor recovering data is desirable, but on proactively cleansing the cover media from possible ...
Guillermo A. Francia, Tyler S. Gomez
openaire +1 more source
2007
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals.
Merrill Warkentin +2 more
openaire +1 more source
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals.
Merrill Warkentin +2 more
openaire +1 more source
5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), 2006
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is ...
M. Shirali-Shahreza, S. Shirali-Shahreza
openaire +1 more source
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is ...
M. Shirali-Shahreza, S. Shirali-Shahreza
openaire +1 more source
2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to ...
Xin Liao, Qiao-yan Wen, Sha Shi
openaire +1 more source
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to ...
Xin Liao, Qiao-yan Wen, Sha Shi
openaire +1 more source

