نتایج جستجو برای: network steganography
تعداد نتایج: 675311 فیلتر نتایج به سال:
Steganography is the art and science of hidingcommunication; a steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. In the past, people used hidden tattoos or invisible ink to convey steganographic content. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can ...
With the rapid development of Internet, safe covert communications in the network environment become an essential research direction. Steganography is a significant means that secret information is embedded into cover data imperceptibly for transmission, so that information cannot be easily aware by others. Text Steganography is low in redundancy and related to natural language rules these lead...
Information hiding techniques, specifically steganography, have been extensively researched for over two decades. However, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Androi...
A steganographer network corresponds to a graphic structure that the involved vertices (or called nodes) denote social entities such as the data encoders and data decoders, and the associated edges represent any real communicable channels or other social links that could be utilized for steganography. Unlike traditional steganographic algorithms, a steganographer network models steganographic c...
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
This paper introduces a model for the authentication of large-scale images. The crucial element proposed is optimized Pulse Coupled Neural Network. neural network generates position matrices based on which embedding data into cover images applied. Emphasis placed minimalization stego image entropy change. Stego consequently compared with reference image. security suggested solution granted by w...
Today, communication is main part of everybody’s life. Security is the most important issue in any communication. So we need a secured system to exchange data securely between users. For this purpose of security there are various techniques like cryptography, watermarking and steganography. Steganography is used to transmit information in covered form. In steganography we hide the presence of d...
Steganography is a technique to hide/protect the information. Many people are using this technique to hide their malicious data, so that such data can not be intercepted easily. This paper deals with a review on various Stegangraphy and Steganalysis Techniques .Different papers related to steganography, classification of steganography, video steganography were studied and reviewed. The aim is t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید