نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

2012
Baluram Nagaria Ashish Parikh

Today’s all the multimedia work done via internet so it’s an urgent need to protect the data from malicious attacks. This lead to the research in the area of Digital watermarking and cryptography which intends to protect the copyright information of the intellectuals. In this paper a DCT based steganography scheme is proposed which provides higher resistance to image processing attacks such as ...

2015
D. Pavlin

Hybrid network steganography method RSTEG was implemented for Windows TCP/IP stack. The implementation description is provided, including further development prospects.

2011
Zuzana Komínková Oplatková Jiri Holoska Ivan Zelinka Roman Senkerik Roman Jasek

The paper deals with a steganalysis of PQ algorithm by means of neural networks. The paper continues with the research of steganalysis by means of neural networks and brings results for the other steganography tool and also simulation results for different settings of neural network.

The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

2014
Christopher Connolly Patrick Lincoln Ian Mason Vinod Yegneswaran

Chris Connolly explained that TRIST attempts to subvert statelevel censorship by encoding hidden messages steganographically in images and video. However, because images and video are posted to social networks (Facebook or YouTube), naively encoded hidden messages are often lost in the transcoding/compressing done by the social networks. TRIST attempts to solve this by using an encoding that su...

2011
Mehdi Hariri Ronak Karimi Masoud Nosrati

In this paper, we are going to introduce different types of steganography considering the cover data. As the first step, we will talk about text steganography and investigate its details. Then, image steganography and its techniques will be investigated. Some techniques including Least Significant Bits, Masking and filtering and Transformations will be subjected during image steganography. Fina...

2012
Elzbieta Zielinska Wojciech Mazurczyk Krzysztof Szczypiorski

Steganography is a general term referring to all methods for the embedding of additional secret content into some form of carrier, with the aim of concealment of the introduced alterations. The choice of the carrier is nearly unlimited, it may be an ancient piece of parchment, as well as a network protocol header. Inspired by biological phenomena, adopted by man in the ancient times, it has bee...

2013
C. KAVITHA ANTONY JUDICE

Today, computer and network technologies provide easy-to-use communication channels for steganography. In most algorithm used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. Digital Steganography exploits the use of a host data to hide a pie...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید