Results 41 to 50 of about 53,525 (364)
Translation-based steganography [PDF]
This paper investigates the possibilities of steganographically embedding information in the “noise” created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications.
Grothoff, Christian+4 more
openaire +5 more sources
Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks.
Shahid Rahman+5 more
semanticscholar +1 more source
Steganography Security: Principle and Practice
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke+4 more
doaj +1 more source
Steganography in Thai Text [PDF]
Steganography, or communication through covert channels, is desirable when the mere existence of an encrypted message might cause suspicion or provide useful information to eavesdroppers. Text is effective for steganography due to its ubiquity; however, text communication channels do not necessarily provide sufficient redundancy for covert ...
Natthawut Samphaiboon, Matthew N. Dailey
openaire +3 more sources
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj +1 more source
A Cryptographic Approach for Steganography [PDF]
In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains.
Jacques M. Bahi+2 more
openaire +3 more sources
Steganography - INTRODUCTION TO STEGANOGRAPHY
Steganography - INTRODUCTION TO ...
openaire +2 more sources
Generative Steganography by Sampling [PDF]
In this paper, a novel data-driven information hiding scheme called generative steganography by sampling (GSS) is proposed. Unlike in traditional modification-based steganography, in our method the stego image is directly sampled by a powerful generator: no explicit cover is used.
Zhuo Zhang+6 more
openaire +4 more sources
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj +1 more source
Learning to Generate Steganographic Cover for Audio Steganography Using GAN
Audio steganography aims to exploit the human auditory redundancy to embed the secret message into cover audio, without raising suspicion when hearing it. However, recent studies have shown that the existing audio steganography can be easily exposed with
Lang Chen+3 more
doaj +1 more source