Results 31 to 40 of about 56,459 (364)

Steganography Security: Principle and Practice

open access: yesIEEE Access, 2018
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke   +4 more
doaj   +1 more source

Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

open access: yesTrudy Odesskogo Politehničeskogo Universiteta, 2016
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj   +1 more source

Detecting fingerprints of audio steganography software

open access: yesForensic Science International: Reports, 2020
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong   +5 more
doaj   +1 more source

Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography [PDF]

open access: yesIEEE Transactions on Computational Social Systems, 2021
The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding.
Zihan Wang   +7 more
semanticscholar   +1 more source

A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers

open access: yesApplied Sciences, 2023
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany   +3 more
doaj   +1 more source

Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector

open access: yesIEEE Transactions on Information Forensics and Security, 2022
Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods.
R. Cogranne, Quentin Giboulot, P. Bas
semanticscholar   +1 more source

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

Adaptive Image Steganography Against JPEG Compression [PDF]

open access: yesJisuanji kexue
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj   +1 more source

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy