نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

2008
Wojciech Mazurczyk Krzysztof Szczypiorski

The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protoc...

2015
TOHARI AHMAD

Computer network has made it easy to exchange data; however, there is a security challenge raising from it. This is because the transmitting data can be intercepted by an attacker. Steganography can be used to prevent an attacker from exploring the information in the intercepted data. There are three common problems in the steganography, those are: obtaining both secret data and cover data from...

2013
Anamika Sharma Pushpinder Singh

In the current world of information technology, the sending and receiving of digital data through network is not secure up to the extent. There is a need to maintain the robustness and imperceptibility property of the data. So a technique is used, that fulfill these requirements is audio steganography that take the advantages of human auditory system to hide the digital data. In this research w...

2004
Rajarathnam Chandramouli Shalin P. Trivedi R. N. Uma

We analyze the complexity of the steganography problem and show that the decision version of the problem is NP-complete through transformation from the Knapsack problem. We also give a pseudo-polynomial time algorithm to optimally solve the steganography problem. This optimal algorithm can also be applied to image steganography.

Journal: :PeerJ PrePrints 2015
Thomas Sloan Julio Hernandez-Castro

Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence. Digital steganography has been used in the past on a variety of media including executable files, audio, text, games and, notably, images. Additionally, there is increasing research interest towards the use of video as a media for...

2014
Ruchi Jain Bhanu Pratap Singh

Now-a-days a fast growth of internet in the present world, social networking websites like Twitter& Facebook are being increasingly used by individuals of all over the world to share their life activities and events via images. But this vastly popular observable fact of image sharing on internet is exposed to a lot of risks. At present, these social networking websites are not bounded by string...

2009
Naofumi Aoki

Steganography may be employed for secretly transmitting side information in order to improve the performance of signal processing such as packet loss concealment and band extension of telephony speech. The previous studies employ LSB replacement technique for embedding steganogram information into speech data. Instead of such a lossy steganography technique, this study proposes a lossless stega...

Journal: :I. J. Network Security 2015
Amitava Nag Sushanta Biswas Debasree Sarkar Partha Pratim Sarkar

Steganography is the branch of information hiding for secret communication. The simplest and widely used steganography is the LSB based approach due to its visual quality with high embedding capacity. However, LSB based steganography techniques are not secure against statistical steganalysis mainly χ2 attack and Regular Singular (RS) attack. These two staganalysis can easily estimate the hidden...

2014
Unik Lokhande

Hiding data is a very important thing nowadays as the data travels over various unsecure networks. To avoid this problem cryptography is used which hides the data or scrambles your message, but cryptography alone cannot provide total security as the message is still available to perform cryptanalysis. Steganography hides the existence of the message. Most of the peoples use either cryptography ...

2016
Ratnakirti Roy Suvamoy Changder

Steganography techniques find importance in military applications because of their ability to communicate covertly. It is evident for any image steganography technique that if the payload can be represented in a smaller dimension than its original form, then the actual embedding requirement can be lessened thereby improving the statistical imperceptibility of the method. This paper presents an ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید