Results 21 to 30 of about 5,924 (276)
SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper,
Xintao Duan +4 more
doaj +1 more source
An Ensemble Transfer Learning Model for Detecting Stego Images
As internet traffic grows daily, so does the need to protect it. Network security protects data from unauthorized access and ensures their confidentiality and integrity.
Dina Yousif Mikhail +2 more
doaj +1 more source
comparatives study of steganography and steganalysis tools
Steganography is one of the oldest methods of secure communication. It was an art at the beginning, now became a science. It aims to conceal secret messages or data inside an innocent cover. Steganalysis is the science that can detect and extract hidden data.
BENAROUS Leila +2 more
openaire +2 more sources
A study on the false positive rate of Stegdetect [PDF]
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz +13 more
core +1 more source
An analysis of the possibility of realization steganography in C#
The computing power of modern computers is sufficient to break many cryptographic keys, therefore it is necessary to create an additional security layer which hides the very fact of transmitting a secret message.
Piotr Pawlak +2 more
doaj +1 more source
Types and Tools of Steganography
Abstract: Steganography is the practice of concealing a secret message inside of another message. It is a form of covert communication and can involve the use of any medium like a computer file, message, image, or video within the other file, message, image or video.
openaire +1 more source
Steganography Using Bin-Walk Tool & Its Overview
In this paper, a detailed overview on steganography & its Types, tools, techniques is conducted to study and look over them. This research involves the steganography using binwalk tool in the Necromancer. Necromancer is the vulnerable virtual machine, in order to gain the root access of VM (Virtual Machine) there are 11 flags to collect on the way,
Pooja Gaikwad +5 more
openaire +1 more source
Performance Analysis of Open Source Image Steganography Tools
In the present epoch, where technology is rising fast with new developments, the main challenge for the sender is to ensure that information is sent in a correct and covert mode that only the receiver is capable to recognize. Steganography is the art of concealing and transmitting secret information through carrier multimedia without being exposed.
Urmila Pilania +2 more
openaire +1 more source
Robust coverless steganography using limited mapping images
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Xiyao Liu +5 more
doaj +1 more source
How to Bootstrap Anonymous Communication [PDF]
We ask whether it is possible to anonymously communicate a large amount of data using only public (non-anonymous) communication together with a small anonymous channel.
Fazio Nelly +3 more
core +2 more sources

