Results 31 to 40 of about 56,459 (364)
Steganography Security: Principle and Practice
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke +4 more
doaj +1 more source
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj +1 more source
Detecting fingerprints of audio steganography software
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong +5 more
doaj +1 more source
Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography [PDF]
The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding.
Zihan Wang +7 more
semanticscholar +1 more source
A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany +3 more
doaj +1 more source
Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector
Since the introduction of adaptive steganography, most of the recent research works seek at designing cost functions that are evaluated against steganalysis methods.
R. Cogranne, Quentin Giboulot, P. Bas
semanticscholar +1 more source
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar +1 more source
Adaptive Image Steganography Against JPEG Compression [PDF]
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj +1 more source
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca +3 more
core +1 more source

