نتایج جستجو برای: steganography

تعداد نتایج: 3630  

2017

With the wide use and abundance of steganography tools on the Internet, law enforcement authorities have concerns in the trafficking of illicit material through web page images, audio, and other files. Methods of detecting hidden information and understanding the overall structure of this technology is crucial in uncovering these activities. Digital image steganography is growing in use and app...

2011
Ion IVAN Adrian VISOIU Mihai DOINEA

This paper presents the main aspects of the digital content security. It describes the content of watermarking, presenting the steganography concept. SteganoGraphy application is presented and the algorithm used is analyzed. Optimization techniques are introduces to minimize the risk of discovering the information embedded into digital content by means of invisible watermarking. Techniques of a...

2016
Priyanka Pal Shubha Dubey

Image Steganography is a technique of providing some hidden data into the cover or host image so that it can be transmitted in a secure manner. There are various Image Steganography techniques implemented with some advantages and limitations. Here in this paper a complete survey of all the Image Steganography technique their advantages and issues are discussed and analyzed, hence on the basis o...

2007
Domenico Daniele Bloisi Luca Iocchi

In this paper we describe a method for integrating together cryptography and steganography through image processing. In particular, we present a system able to perform steganography and cryptography at the same time using images as cover objects for steganography and as keys for cryptography. We will show such system is an effective steganographic one (making a comparison with the well known F5...

2018

With the wide use and abundance of steganography tools on the Internet, law enforcement authorities have concerns in the trafficking of illicit material through web page images, audio, and other files. Methods of detecting hidden information and understanding the overall structure of this technology is crucial in uncovering these activities. Digital image steganography is growing in use and app...

Journal: :Telecommunication Systems 2010
Wojciech Mazurczyk Józef Lubacz

The paper presents a new steganographic method called LACK (Lost Audio PaCKets Steganography) which is intended mainly for VoIP. The method is presented in a broader context of network steganography and of VoIP steganography in particular. The analytical results presented in the paper concern the influence of LACK’s hidden data insertion procedure on the method’s impact on quality of voice tran...

2017

With the wide use and abundance of steganography tools on the Internet, law enforcement authorities have concerns in the trafficking of illicit material through web page images, audio, and other files. Methods of detecting hidden information and understanding the overall structure of this technology is crucial in uncovering these activities. Digital image steganography is growing in use and app...

2013
Sushil Jajodia Karen Bailey

(Markus Kahn, 1995) defines Steganography as art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other innocent messages in...

2012
Dipesh G. Kamdar C. H. Vithalani

Digital communication has become an essential part of society. Nowadays, a lot of applications are internet based and it is important that communication be made faithful and secret. Steganography and Cryptography are two popular ways of information exchange in a secret way. Steganography hides the existence of the message and the Cryptography distorts the message itself. Using Cryptography, the...

2016
Sebastian Berndt Maciej Liskiewicz

This paper considers steganography – the concept of hiding the presence of secret messages in legal communications – in the computational setting and its relation to cryptography. Very recently the first (non-polynomial time) steganographic protocol has been shown which, for any communication channel, is provably secure, reliable, and has nearly optimal bandwidth. The security is unconditional,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید