Results 41 to 50 of about 53,525 (364)

Translation-based steganography [PDF]

open access: yesJournal of Computer Security, 2005
This paper investigates the possibilities of steganographically embedding information in the “noise” created by automatic translation of natural language documents. Because the inherent redundancy of natural language creates plenty of room for variation in translation, machine translation is ideal for steganographic applications.
Grothoff, Christian   +4 more
openaire   +5 more sources

A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method

open access: yesIEEE Access, 2022
Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks.
Shahid Rahman   +5 more
semanticscholar   +1 more source

Steganography Security: Principle and Practice

open access: yesIEEE Access, 2018
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke   +4 more
doaj   +1 more source

Steganography in Thai Text [PDF]

open access: yesInternational Journal of Digital Crime and Forensics, 2008
Steganography, or communication through covert channels, is desirable when the mere existence of an encrypted message might cause suspicion or provide useful information to eavesdroppers. Text is effective for steganography due to its ubiquity; however, text communication channels do not necessarily provide sufficient redundancy for covert ...
Natthawut Samphaiboon, Matthew N. Dailey
openaire   +3 more sources

Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

open access: yesTrudy Odesskogo Politehničeskogo Universiteta, 2016
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj   +1 more source

A Cryptographic Approach for Steganography [PDF]

open access: yes2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains.
Jacques M. Bahi   +2 more
openaire   +3 more sources

Generative Steganography by Sampling [PDF]

open access: yesIEEE Access, 2019
In this paper, a novel data-driven information hiding scheme called generative steganography by sampling (GSS) is proposed. Unlike in traditional modification-based steganography, in our method the stego image is directly sampled by a powerful generator: no explicit cover is used.
Zhuo Zhang   +6 more
openaire   +4 more sources

Design and Implementation of Automated Steganography Image-Detection System for the KakaoTalk Instant Messenger

open access: yesComputers, 2020
As the popularity of social network service (SNS) messengers (such as Telegram, WeChat or KakaoTalk) grows rapidly, cyberattackers and cybercriminals start targeting them, and from various media, we can see numerous cyber incidents that have occurred in ...
Jun Park, Youngho Cho
doaj   +1 more source

Learning to Generate Steganographic Cover for Audio Steganography Using GAN

open access: yesIEEE Access, 2021
Audio steganography aims to exploit the human auditory redundancy to embed the secret message into cover audio, without raising suspicion when hearing it. However, recent studies have shown that the existing audio steganography can be easily exposed with
Lang Chen   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy