Results 51 to 60 of about 53,525 (364)

Steganography in beautified mages

open access: yesMathematical Biosciences and Engineering, 2019
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images.
Guorui Feng   +4 more
openaire   +4 more sources

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats

open access: yes, 2014
Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.
Caviglione, Luca   +3 more
core   +1 more source

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

A Review on Text Steganography Techniques

open access: yesMathematics, 2021
There has been a persistent requirement for safeguarding documents and the data they contain, either in printed or electronic form. This is because the fabrication and faking of documents is prevalent globally, resulting in significant losses for ...
M. Majeed   +3 more
semanticscholar   +1 more source

CHALLENGES IN MULTI-LAYER DATA SECURITY FOR VIDEO STEGANOGRAPHY

open access: yesAsia-Pacific Journal of Information Technology and Multimedia, 2018
The steganography is prone to number of attacks such as geomatical, salt & pepper, gaussian, median filtering, attacks. To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography ...
Samar Kamil   +3 more
doaj   +1 more source

IoT based on secure personal healthcare using RFID technology and steganography

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2021
Internet of things (IoT) makes it attainable for connecting different various smart objects together with the internet. The evolutionary medical model towards medicine can be boosted by IoT with involving sensors such as environmental sensors inside the ...
Haider Ali Khan   +3 more
semanticscholar   +1 more source

Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]

open access: yesEngineering and Technology Journal, 2016
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj   +1 more source

A Steganography Implementation

open access: yes, 2018
Numerous techniques are utilized to hide information in different organizations in steganography. The most broadly utilized system by virtue of its straightforwardness is the utilization of the Least Significant Bit. Least Significant Bit or its variations are typically used to shroud information in a digital image. Alternate bits might be utilized yet
Miss. Pooja N. Dhawale   +2 more
openaire   +2 more sources

Computationally secure steganography based on speech synthesis

open access: yes网络与信息安全学报, 2022
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography ...
Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
doaj   +3 more sources

Benchmarking for Steganography [PDF]

open access: yes, 2008
With the increasing number of new steganographic algorithms as well as methods for detecting them, the issue of comparing security of steganographic schemes in a fair manner is of the most importance. A fair benchmark for steganography should only be dependent on the model chosen to represent cover and stego objects.
Tomáš Pevný, Jessica Fridrich
openaire   +2 more sources

Home - About - Disclaimer - Privacy