Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza +2 more
doaj +1 more source
Using Facebook for Image Steganography
Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held ...
Dakve, Tejas +3 more
core +1 more source
Hiding information in image using circular distribuition [PDF]
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core
Principle of Steganography Tool BCS (Bilevel Compression by Using Steganography)
In this paper we make a new approach of compression used as a tool of steganography instead of make it as obstacle (BCS). The outline of BCS compression used two steps level 1 and level 2, level 1 is a new approach of compress images which depends on the fact that every paint has a limited colors, that make it reduce the physical size of repeating ...
openaire +2 more sources
Forensic steganalysis for identification of steganography software tools using multiple format image
<p>Today many steganographic software tools are freely available on the Internet, which helps even callow users to have covert communication through digital images. Targeted structural image steganalysers identify only a particular steganographic software tool by tracing the unique fingerprint left in the stego images by the steganographic ...
S. T. Veena, A. Selvaraj
openaire +2 more sources
Image Steganography Based on Artificial Immune in Mobile Edge Computing With Internet of Things
Mobile edge computing provides high computing power, data storage capacity and bandwidth requirements for Internet of Things (IoT) through edge servers that process data close to data sources or users.
Xuyang Ding +4 more
doaj +1 more source
Steganography based on parameters’ disturbance of spatial image transform
In the research of state-of-the-art steganography algorithms,most of image sources were natural images in laboratory environment.However,with the rapid development of image process tools and applications,images after image processing were widely used in ...
Xi SUN +3 more
doaj +2 more sources
A Privacy-Preserving Method Based on Artificial Immune Computing in MCS
Due to the widespread use of mobile intelligent terminal devices, Mobile Crowd Sensing (MCS) applications have gained significant research attention. However, ensuring users privacy remains a critical challenge, as it can hinder users’ willingness
Hao Long +4 more
doaj +1 more source
Towards Steganography Detection Through Network Traffic Visualisation
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz +2 more
core +1 more source
Detecting the fingerprint of video data hiding tool OpenPuff
This paper proposes an effective fingerprint detection method against the video steganography and watermarking of OpenPuff, one of the leading tools for its capability to securely hide information.
Yu Wang, Xianfeng Zhao, Yun Cao
doaj +1 more source

