نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

Journal: :International Journal of Network Security & Its Applications 2016

Journal: :CAAI Transactions on Intelligence Technology 2023

Video steganography plays an important role in secret communication that conceals a video cover by perturbing the value of pixels frames. Imperceptibility is first and foremost requirement any steganographic approach. Inspired fact human eyes perceive pixel perturbation differently different areas, novel effective efficient Deeply-Recursive Attention Network (DRANet) for to find suitable areas ...

2014
Rola Al-Sharif Christophe Guyeux Yousra Ahmed Fadil Abdallah Makhoul Ali Jaber

A wireless sensor network (WSN) typically consists of base stations and a large number of wireless sensors. The sensory data gathered from the whole network at a certain time snapshot can be visualized as an image. As a result, information hiding techniques can be applied to this “sensory data image”. Steganography refers to the technology of hiding data into digital media without drawing any s...

2016
Harjit Singh

Modern era of digital communication raise many challenges in secrecy of data when it is transferred over the network. The data to be transferred over the network can be grabbed by third party on the way. Steganography is a method to hide secret data from third party. The secret data is embedded in some cover media in such a way that no one else is aware of it. Different cover media are availabl...

2014
Arun Karthick

Day to day, network and its technologies is getting rapid growth, due to its improved infrastructure in to hold on; the situation organization and migration of recent updates will leads the network called Security flaw. Various security options are available since the data leakage and back door communication leads to heavy data loss to the organization. In this paper we developed a new scheme w...

2013
B. Geetha E. V. Prasad

Steganography is an art of hiding the information without any change in the external appearance of the cover object. Cryptography is a technique to make the information unreadable for unauthorized users. Making the data unreadable and hiding it, will make the data highly secure. Image steganography allows the user to hide a large amount of data inside an image. On transmission side Steganograph...

Journal: :Applied sciences 2021

Protecting sensitive information transmitted via public channels is a significant issue faced by governments, militaries, organizations, and individuals. Steganography protects the secret concealing it in transferred object such as video, audio, image, text, network, or DNA. As text uses low bandwidth, commonly used Internet users their daily activities, resulting vast amount of messages sent s...

2014
Ekta Dagar Sunny Dagar

Due to the high growth in the field of Computer Networks and Internet, there is a need for a secure transfer of information over the network. The data is in a great threat to be hacked by the hackers as it is transferred over the communication channels. Image Steganography is a technique which hides secret information inside an image and conceals the existence of the communication. No one could...

Journal: :International Journal of Electronics and Telecommunications 2023

Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or Document, without its existence getting noticed. Over the past few years, lot research has been done in field Video and Audio but very little work Steganography. A hides Data Unit, i.e., Packet. In this paper we present an algorithm ARPNetSteg implements Address res...

Journal: :CoRR 2017
H. Wu W. Wang J. Dong H. Wang

Steganography aims to conceal the very fact that the communication takes place, by embedding a message into a digit object such as image without introducing noticeable artifacts. A number of steganographic systems have been developed in past years, most of which, however, are confined to the laboratory conditions where the real-world use of steganography are rarely concerned. In this paper, we ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید