Results 361 to 370 of about 53,608 (389)
Some of the next articles are maybe not open access.
2008
Publisher Summary This chapter focuses on a specific data-hiding application—steganography. As opposed to digital watermarking, the main property of steganography is statistical undetectability of embedded data. The payload is usually unrelated to the cover Work, which only serves as a decoy.
Ingemar J. Cox+4 more
openaire +2 more sources
Publisher Summary This chapter focuses on a specific data-hiding application—steganography. As opposed to digital watermarking, the main property of steganography is statistical undetectability of embedded data. The payload is usually unrelated to the cover Work, which only serves as a decoy.
Ingemar J. Cox+4 more
openaire +2 more sources
2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to ...
Xin Liao, Sha Shi, Qiao-yan Wen
openaire +2 more sources
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to ...
Xin Liao, Sha Shi, Qiao-yan Wen
openaire +2 more sources
Communications of the ACM, 2014
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
Elzbieta Zielinska+2 more
openaire +2 more sources
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged.
Elzbieta Zielinska+2 more
openaire +2 more sources
Compression‐based steganography
Concurrency and Computation: Practice and Experience, 2019SummaryConventional privacy‐enforcement mechanisms, such as encryption‐based ones, are frequently used to prevent third‐party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in ...
Carpentieri B.+4 more
openaire +3 more sources
Digital image steganography: challenges, investigation, and recommendation for the future direction
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2023A. A. Abdulla
semanticscholar +1 more source
2007 IEEE International Multitopic Conference, 2007
After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features ...
openaire +2 more sources
After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features ...
openaire +2 more sources
On the limits of steganography
IEEE Journal on Selected Areas in Communications, 1998In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in ...
Fabien A. P. Petitcolas, Ross Anderson
openaire +1 more source
Digital image steganography: A literature survey
Information Sciences, 2022Pratap Chandra Mandal+3 more
semanticscholar +1 more source
2009 2nd International Congress on Image and Signal Processing, 2009
This paper presents a novel LSB steganographic scheme which attempts to defeat statistical steganalysis. The embedding distortion introduced to the cover image is small for perceptual and statistical detection. The modification of image pixel values for embedding is just like conventional image processing which is capable of resisting all kinds of LSB ...
Aiming Wang, Xiao Yi Yu
openaire +2 more sources
This paper presents a novel LSB steganographic scheme which attempts to defeat statistical steganalysis. The embedding distortion introduced to the cover image is small for perceptual and statistical detection. The modification of image pixel values for embedding is just like conventional image processing which is capable of resisting all kinds of LSB ...
Aiming Wang, Xiao Yi Yu
openaire +2 more sources
2018
Due to the popularity of Internet and communication media, data security is one of the most focused areas of research. Cryptography and steganography are two important disciplines in the area of security. Image steganography is one of the techniques used to hide data inside an innocent image so that it is not visible to an eavesdropper while ...
openaire +2 more sources
Due to the popularity of Internet and communication media, data security is one of the most focused areas of research. Cryptography and steganography are two important disciplines in the area of security. Image steganography is one of the techniques used to hide data inside an innocent image so that it is not visible to an eavesdropper while ...
openaire +2 more sources