نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

2016
Manashee Kalita Themrichon Tuithung Hong-Juan Zhang Hong-Jun Tang

Transmitting data from sender to authorized receiver through a public media (insecure media) with full security is a challenging task. From the ancient time, different methods and techniques have been adopted to gain secure transmission of information. With the development of new technologies, the techniques used for securing information have also changed. The three main technology used for sec...

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2023

Steganography is a technique for covert communication between two parties. With the rapid development of deep neural networks (DNN), more and steganographic are proposed recently, which shown to be promising achieve good performance. Unlike traditional handcrafted tools, network relatively large in size. It raises concerns on how covertly transmit public channels, crucial stage pipeline stegano...

Journal: :CoRR 2017
Songtao Wu Sheng-hua Zhong Yan Liu

Deep learning based image steganalysis has attracted increasing attentions in recent years. Several Convolutional Neural Network (CNN) models have been proposed and achieved state-of-the-art performances on detecting steganography. In this paper, we explore an important technique in deep learning, the batch normalization, for the task of image steganalysis. Different from natural image classifi...

2009
NEIL R. BENNETT James Kowalski Yan Sun

This thesis presents two areas of research connected steganography. In the first section we focus on detection of steganography in JPEGs. Using current detection methods proposed by Fridrich et al we examine the effect of a real-world implementation of the detection scheme in order to facilitate usage of a detection tool for law enforcement. Fridrichs work is based around machine learning and a...

2014
Harleen Kaur Surinder Kaur

In this paper we will overview how data hiding can be done using Cryptography. Basically, we will describe how one can use Steganography for hiding data with Cryptography. Cryptography and Steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting confident...

2006
Andreas Westfeld

Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems. However, new problems for cryptographic mechanisms arise from the context of steganography. There are two sorts of steganographic tools: commercial tools with insecure or badly implemented cryptography and academic proof-of-concepts...

2013
P. lavanya Ratna Jyothi

In network applications communication is the main aspect in present days. Data transformation is the process of sending data from one person to another person. In this contrast present security is the main issue in network communication. Steganography is the one of the data hiding technique that can be used in secret data sharing applications. Traditionally Forbidden Zone Data Hiding was develo...

Journal: :Digital Investigation 2005
Brent T. McBride Gilbert L. Peterson Steven C. Gustafson

Steganography is the art of hiding a message in plain sight. Modern steganographic tools that conceal data in innocuous-looking digital image files are widely available. The use of such tools by terrorists, hostile states, criminal organizations, etc., to camouflage the planning and coordination of their illicit activities poses a serious challenge. Most steganography detection tools rely on si...

2012
Ramanpreet Kaur Baljit Singh Ishpreet Singh

ABSTRACT: Steganography hides the existence of the data inside any cover file. There are different file formats used in steganography like text, image, audio and video. Out of these file formats image steganography is followed in this paper .One of the major objective of hiding data using image steganography is to hide the data in an image, so that the changes in the intensity of the colors of ...

2011
Rajkumar Yadav

Every common person uses internet directly or indirectly in some spheres of his life. They mainly use the internet for information sharing. Also, information sharing has the primary importance in the field of Military Services, Medical Services, Mobile Services, and Investigation Agencies etc. The main hurdle in the path of information sharing is the security of information. The information sec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید