Results 21 to 30 of about 5,924 (276)

SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network

open access: yesEntropy, 2020
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper,
Xintao Duan   +4 more
doaj   +1 more source

An Ensemble Transfer Learning Model for Detecting Stego Images

open access: yesApplied Sciences, 2023
As internet traffic grows daily, so does the need to protect it. Network security protects data from unauthorized access and ensures their confidentiality and integrity.
Dina Yousif Mikhail   +2 more
doaj   +1 more source

comparatives study of steganography and steganalysis tools

open access: yesAlgerian Journal of Signals and Systems, 2021
Steganography is one of the oldest methods of secure communication. It was an art at the beginning, now became a science. It aims to conceal secret messages or data inside an innocent cover. Steganalysis is the science that can detect and extract hidden data.
BENAROUS Leila   +2 more
openaire   +2 more sources

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

An analysis of the possibility of realization steganography in C#

open access: yesJournal of Computer Sciences Institute, 2021
The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message.
Piotr Pawlak   +2 more
doaj   +1 more source

Types and Tools of Steganography

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: Steganography is the practice of concealing a secret message inside of another message. It is a form of covert communication and can involve the use of any medium like a computer file, message, image, or video within the other file, message, image or video.
openaire   +1 more source

Steganography Using Bin-Walk Tool & Its Overview

open access: yesInternational Journal of Computer Science and Mobile Computing, 2021
In this paper, a detailed overview on steganography & its Types, tools, techniques is conducted to study and look over them. This research involves the steganography using binwalk tool in the Necromancer. Necromancer is the vulnerable virtual machine, in order to gain the root access of VM (Virtual Machine) there are 11 flags to collect on the way,
Pooja Gaikwad   +5 more
openaire   +1 more source

Performance Analysis of Open Source Image Steganography Tools

open access: yesJournal of Engineering and Applied Sciences, 2021
In the present epoch, where technology is rising fast with new developments, the main challenge for the sender is to ensure that information is sent in a correct and covert mode that only the receiver is capable to recognize. Steganography is the art of concealing and transmitting secret information through carrier multimedia without being exposed.
Urmila Pilania   +2 more
openaire   +1 more source

Robust coverless steganography using limited mapping images

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Xiyao Liu   +5 more
doaj   +1 more source

How to Bootstrap Anonymous Communication [PDF]

open access: yes, 2015
We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel.
Fazio Nelly   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy