Results 321 to 330 of about 56,459 (364)
Some of the next articles are maybe not open access.
Proceedings of the 3rd annual conference on Information security curriculum development, 2006
Steganography is the art of concealing messages through hidden data that is embedded in a carrier medium. Current steganalysis practices focus on detecting and recovering these pieces of hidden data. This paper focuses on instances when neither detecting nor recovering data is desirable, but on proactively cleansing the cover media from possible ...
Guillermo A. Francia, Tyler S. Gomez
openaire +1 more source
Steganography is the art of concealing messages through hidden data that is embedded in a carrier medium. Current steganalysis practices focus on detecting and recovering these pieces of hidden data. This paper focuses on instances when neither detecting nor recovering data is desirable, but on proactively cleansing the cover media from possible ...
Guillermo A. Francia, Tyler S. Gomez
openaire +1 more source
2007
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals.
Merrill Warkentin +2 more
openaire +1 more source
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the combination of text with medical images. But the technique can also be used for criminal purposes or by terrorists to disguise communications between individuals.
Merrill Warkentin +2 more
openaire +1 more source
5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse (ICIS-COMSAR'06), 2006
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is ...
M. Shirali-Shahreza, S. Shirali-Shahreza
openaire +1 more source
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is ...
M. Shirali-Shahreza, S. Shirali-Shahreza
openaire +1 more source
2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to ...
Xin Liao, Qiao-yan Wen, Sha Shi
openaire +1 more source
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to ...
Xin Liao, Qiao-yan Wen, Sha Shi
openaire +1 more source
International Journal of Digital Crime and Forensics, 2019
This article describes how to overcome the shortage of steganalysis for small capacity-based embedding. A slight modification method is proposed to break steganography. For a given image, traditional steganalysis methods are first used to achieve a preliminary result.
Zhenxing Qian +3 more
openaire +1 more source
This article describes how to overcome the shortage of steganalysis for small capacity-based embedding. A slight modification method is proposed to break steganography. For a given image, traditional steganalysis methods are first used to achieve a preliminary result.
Zhenxing Qian +3 more
openaire +1 more source
Proceedings of the 8th workshop on Multimedia and security, 2006
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity of a prototypical implementation of both approaches are described and discussed.
Christian Krätzer +3 more
openaire +1 more source
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectability and capacity of a prototypical implementation of both approaches are described and discussed.
Christian Krätzer +3 more
openaire +1 more source
Digital image steganography: challenges, investigation, and recommendation for the future direction
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023A. A. Abdulla
semanticscholar +1 more source
A Novel Image Steganography Method for Industrial Internet of Things Security
IEEE Transactions on Industrial Informatics, 2021M. Hassaballah +3 more
semanticscholar +1 more source

