Results 11 to 20 of about 5,951 (273)
Forensic analysis of video steganography tools [PDF]
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence.
Thomas Sloan, Julio Hernandez-Castro
doaj +3 more sources
A comparatives study of steganography and steganalysis tools
Steganography is one of the oldest methods of secure communication. It was an art at the beginning, now became a science. It aims to conceal secret messages or data inside an innocent cover. Steganalysis is the science that can detect and extract hidden
BENAROUS Leila +2 more
doaj +3 more sources
Image steganography without embedding by carrier secret information for secure communication in networks. [PDF]
Steganography, the use of algorithms to embed secret information in a carrier image, is widely used in the field of information transmission, but steganalysis tools built using traditional steganographic algorithms can easily identify them. Steganography
Yangwen Zhang +5 more
doaj +2 more sources
Coverless Image Steganography Based on Generative Adversarial Network
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin +5 more
doaj +3 more sources
A Two-Phase Embedding Approach for Secure Distributed Steganography [PDF]
Steganography serves a crucial role in secure communications by concealing information within non-suspicious media, yet traditional methods often lack resilience and efficiency.
Kamil Woźniak +2 more
doaj +2 more sources
AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography [PDF]
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant ...
Haiju Fan, Changyuan Jin, Ming Li
doaj +2 more sources
Approaches to obtaining fingerprints of steganography tools which embed message in fixed positions
Recently, more and more steganography tools are exploited to embed malicious code into images by attackers, which bring harm to society. Thus, it has been a tricky problem, for which needs to detect the stego-images correctly.
Pengjie Cao +3 more
doaj +2 more sources
Steganalisis digunakan untuk mendeteksi ada atau tidaknya file steganografi. Salah satu kategori steganalisis adalah blind steganalisis, yaitu cara untuk mendeteksi file rahasia tanpa mengetahui metode steganografi apa yang digunakan.
Nurmi Hidayasari +2 more
doaj +3 more sources
Coverless Image Steganography: A Survey
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin +4 more
doaj +3 more sources
Security-oriented steganographic payload allocation for multi-remote sensing images [PDF]
Multi-image steganography, a technique for concealing information within multiple carrier mediums, finds remote sensing images to be particularly apt carriers due to their complex structures and abundant texture data.
Tian Wu, Xuan Hu, Chunnian Liu
doaj +2 more sources

