Results 41 to 50 of about 47,392 (384)

Steganography in VLC Systems [PDF]

open access: yesJournal of Universal Computer Science, 2017
JUCS - Journal of Universal Computer Science Volume Nr.
Blinowski,Grzegorz   +1 more
openaire   +3 more sources

Binary image steganography method based on layered embedding

open access: yes网络与信息安全学报, 2021
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG   +3 more
doaj   +3 more sources

A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers

open access: yesApplied Sciences, 2023
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany   +3 more
doaj   +1 more source

A Revised Taxonomy of Steganography Embedding Patterns [PDF]

open access: yesProc. of the 16th International Conference on Availability, Reliability and Security (ARES'21), August 17--20, 2021, Vienna, Austria, 2021
Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital media steganography, text steganography, cyber-physical systems steganography, network steganography (network covert channels), local covert channels, and out-of-band covert ...
arxiv   +1 more source

Image Steganography

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret message is being sent and its
Yendluri Lohith JayaSurya   +2 more
openaire   +2 more sources

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

IoT based on secure personal healthcare using RFID technology and steganography

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2021
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the ...
Haider Ali Khan   +3 more
semanticscholar   +1 more source

Translation-based steganography [PDF]

open access: yesJournal of Computer Security, 2005
This paper investigates the possibilities of steganographically embedding information in the “noise” created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications.
Grothoff, Christian   +4 more
openaire   +5 more sources

Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

open access: yesTrudy Odesskogo Politehničeskogo Universiteta, 2016
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj   +1 more source

A Review on Text Steganography Techniques

open access: yesMathematics, 2021
There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for ...
M. Majeed   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy