نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

2018
Abdulgader Almutairi

Today image steganography plays a key role for exchanging a secret data through the internet. However, the optimal choice of images formats for processing steganography is still an open issue; therefore, this research comes into a table. This research conducts a comparative study between Scalable Vector Graphics (SVG) image format and Portable Network Graphics (PNG) image format. As results sho...

2012
LAVINIA MIHAELA DINCA

The current methods of communication using steganography techniques involve the use of carrier files including network protocols. The current study presents a new method of communication using steganography techniques available today, the carrier being a ping. The study will also present the most effective ways of prevention against this form of secret communication. Key-Words: steganography, i...

Journal: :J. UCS 2015
Steffen Wendzel Carolin Palmer

The research discipline of network steganography deals with the hiding of information within network transmissions, e.g. to transfer illicit information in networks with Internet censorship. The last decades of research on network steganography led to more than hundred techniques for hiding data in network transmissions. However, previous research has shown that most of these hiding techniques ...

Journal: :CoRR 2016
James Collins Sos S. Agaian

Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding da...

2015
Ramandeep Kaur K. Parvathi Divya K. Mahesh Hemant Gupta Setu Chaturvedi Mehdi Hussain Saurabh Singh Ashutosh Datar K. V. Vinodkumar V. Lokeswara Reddy

Video Steganography is a new research area which is playing an important role in information hiding criteria. Nowadays security of confidential information is major issue over the internet. To protect the secret information from cyber criminals like attackers, hackers and data thefts, a secure and standardized methodology is used that is known as steganography. It is beneficial for society to s...

2013
B. Geetha vani

In today’s world, there are a number of cryptographic and steganography techniques used in order to have secured data transfer between a sender and a receiver. In this paper a new hybrid approach that integrates the merits of cryptography and audio steganography is presented. First, the original message is encrypted using chaotic neural network and the resultant cipher text is embedded into a c...

Abstract: JPEG is the most applicable image format in digital communication. In recent years, various steganography methods have been proposed for it. This paper aims to study and classify JPEG steganography schemes and introduce different methods to improve their security based on cover. Accordingly, the effective factors in security that are related to the cover such as double compression, sp...

2014
Unik Lokhande A. K. Gulve

When it comes to information hiding it is always a question whether to use Steganography or cryptography. Cryptography scrambles the message so that is it unrecognizable and without proper key the Encrypted message is useless. With the help of steganography messages can be passed over the network discreetly as it provides secure data hiding. It is very challenging and emerging field of research...

Journal: :Int. Arab J. Inf. Technol. 2010
Ali Al-Ataby Fawzi M. Al-Naima

Steganography is the art and science of concealing information in unremarkable cover media so as not to arouse an eavesdropper’s suspicion. It is an application under information security field. Being classified under information security, steganography will be characterized by having set of measures that rely on strengths and counter measures (attacks) that are driven by weaknesses and vulnera...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید