نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

2014
Suvarna Patil Gajendra Singh Chandel

Steganography is the science of secure communication which has received much attention from the scientific community recently. The four main objectives of steganography are: Indefectibility, Security, embedding payload, and Robustness. However, steganography can protect data by hiding it in a cover object but using it alone may not guarantee total security. Thus, the use of encryption in stegan...

Journal: :Applied sciences 2022

Quantum steganography plays a critical role in embedding confidential data into carrier messages using quantum computing schemes. The variant of outperforms its classical counterpart from security, efficiency and capacity, imperceptibility, time-complexity perspectives. Considerable work has been carried out the literature focusing on steganography. However, holistic view available schemes is m...

Journal: :JDFSL 2009
Asawaree Kulkarni James Goldman Brad Nabholz William Eyre

Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling tech...

2003
Rajarathnam Chandramouli Mehdi Kharrazi Nasir D. Memon

In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following paper we go over some general concepts and ideas that apply to steganography and steganalysis. Specifically we establish a framework and define notion of security for a steganographic system. We show how conventional definitions do not really adequatel...

Journal: :Pattern Recognition Letters 2002
Jeremiah Spaulding Hideki Noda Mahdad Nouri Shirazi Eiji Kawaguchi

This paper presents a steganography method based on an embedded zerotree wavelet (EZW) compression scheme and bit-plane complexity segmentation (BPCS) steganography. The proposed steganography enables us to use lossy compressed images as dummy files in bit-plane-based steganographic algorithms. Large embedding rates of around 25% of the compressed image size were achieved with little noticeable...

Journal: :Jusikom : Jurnal Sistem Informasi Ilmu Komputer 2022

Data security issues become very important when the computer has been used as a communication tool on global network (internet). One method that is quite popular for securing data from irresponsible parties text-based steganography, where confidential or information hidden inserted into other text media so not to arouse suspicion parties. Based input calculated number of words, it significant i...

2013
T. Blesslin Sheeba

Steganography is the art of hiding information in ways that avert the revealing of hiding messages. This paper proposes a new efficient Video Steganography scheme. The design of algorithm enhances the entropy of the data scheme. To enlarge the capacity of the hidden secret information and to provide an imperceptible stego-image for human vision, a steganography approach called using inter pixel...

2013
Seyyed Amin Seyyedi

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. There are many steganography techniques with different kind of container. Digital image are the most popular and frequency used on the internet. In this article we consider the main image steganography techniques and those advantages and disadvantages. Also attempt to iden...

Journal: :The Open Automation and Control Systems Journal 2014

2016
Muhammad Shoaib Zakir Khan Danish Shehzad Arif Iqbal Umar Noor Ul Amin

Audio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security, but none of them has ensured both security and payload at same time. Data Dependency in existing solu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید