Results 11 to 20 of about 5,951 (273)

Forensic analysis of video steganography tools [PDF]

open access: yesPeerJ Computer Science, 2015
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence.
Thomas Sloan, Julio Hernandez-Castro
doaj   +3 more sources

A comparatives study of steganography and steganalysis tools

open access: yesAlgerian Journal of Signals and Systems, 2016
Steganography is one of the oldest methods of secure communication. It was an art at the beginning, now became a science. It aims to conceal secret messages or data inside an innocent cover. Steganalysis is the science that can detect and extract hidden
BENAROUS Leila   +2 more
doaj   +3 more sources

Image steganography without embedding by carrier secret information for secure communication in networks. [PDF]

open access: yesPLoS ONE
Steganography, the use of algorithms to embed secret information in a carrier image, is widely used in the field of information transmission, but steganalysis tools built using traditional steganographic algorithms can easily identify them. Steganography
Yangwen Zhang   +5 more
doaj   +2 more sources

Coverless Image Steganography Based on Generative Adversarial Network

open access: yesMathematics, 2020
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin   +5 more
doaj   +3 more sources

A Two-Phase Embedding Approach for Secure Distributed Steganography [PDF]

open access: yesSensors
Steganography serves a crucial role in secure communications by concealing information within non-suspicious media, yet traditional methods often lack resilience and efficiency.
Kamil Woźniak   +2 more
doaj   +2 more sources

AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography [PDF]

open access: yesEntropy
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant ...
Haiju Fan, Changyuan Jin, Ming Li
doaj   +2 more sources

Approaches to obtaining fingerprints of steganography tools which embed message in fixed positions

open access: yesForensic Science International: Reports, 2019
Recently, more and more steganography tools are exploited to embed malicious code into images by attackers, which bring harm to society. Thus, it has been a tricky problem, for which needs to detect the stego-images correctly.
Pengjie Cao   +3 more
doaj   +2 more sources

Steganalisis Blind dengan Metode Convolutional Neural Network (CNN) Yedroudj- Net terhadap Tools Steganografi

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2020
Steganalisis digunakan untuk mendeteksi ada atau tidaknya file steganografi. Salah satu kategori steganalisis adalah blind steganalisis, yaitu cara untuk mendeteksi file rahasia tanpa mengetahui metode steganografi apa yang digunakan.
Nurmi Hidayasari   +2 more
doaj   +3 more sources

Coverless Image Steganography: A Survey

open access: yesIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +3 more sources

Security-oriented steganographic payload allocation for multi-remote sensing images [PDF]

open access: yesScientific Reports
Multi-image steganography, a technique for concealing information within multiple carrier mediums, finds remote sensing images to be particularly apt carriers due to their complex structures and abundant texture data.
Tian Wu, Xuan Hu, Chunnian Liu
doaj   +2 more sources

Home - About - Disclaimer - Privacy