Results 21 to 30 of about 23,715 (170)
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj +1 more source
Detecting fingerprints of audio steganography software
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong +5 more
doaj +1 more source
New security and control protocol for VoIP based on steganography and digital watermarking [PDF]
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core +3 more sources
Learning to Generate Steganographic Cover for Audio Steganography Using GAN
Audio steganography aims to exploit the human auditory redundancy to embed the secret message into cover audio, without raising suspicion when hearing it. However, recent studies have shown that the existing audio steganography can be easily exposed with
Lang Chen +3 more
doaj +1 more source
JPEG steganography: A performance evaluation of quantization tables [PDF]
The two most important aspects of any image based steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG ...
Al-Mohammad, A, Ghinea, G, Hierons, RM
core +1 more source
Adaptive Image Steganography Against JPEG Compression [PDF]
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj +1 more source
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source
CHALLENGES IN MULTI-LAYER DATA SECURITY FOR VIDEO STEGANOGRAPHY
The steganography is prone to number of attacks such as geomatical, salt & pepper, gaussian, median filtering, attacks. To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography ...
Samar Kamil +3 more
doaj +1 more source
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source
Using Facebook for Image Steganography
Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held ...
Dakve, Tejas +3 more
core +1 more source

