Results 41 to 50 of about 47,392 (384)
Steganography in VLC Systems [PDF]
JUCS - Journal of Universal Computer Science Volume Nr.
Blinowski,Grzegorz+1 more
openaire +3 more sources
Binary image steganography method based on layered embedding
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG+3 more
doaj +3 more sources
A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany+3 more
doaj +1 more source
A Revised Taxonomy of Steganography Embedding Patterns [PDF]
Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital media steganography, text steganography, cyber-physical systems steganography, network steganography (network covert channels), local covert channels, and out-of-band covert ...
arxiv +1 more source
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret message is being sent and its
Yendluri Lohith JayaSurya+2 more
openaire +2 more sources
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source
IoT based on secure personal healthcare using RFID technology and steganography
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the ...
Haider Ali Khan+3 more
semanticscholar +1 more source
Translation-based steganography [PDF]
This paper investigates the possibilities of steganographically embedding information in the “noise” created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications.
Grothoff, Christian+4 more
openaire +5 more sources
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj +1 more source
A Review on Text Steganography Techniques
There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for ...
M. Majeed+3 more
semanticscholar +1 more source