نتایج جستجو برای: steganography

تعداد نتایج: 3630  

Journal: :CoRR 2016
Krzysztof Szczypiorski Tomasz Tyl

This article presents a new method for detecting a source point of time based network steganography MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography s...

2011
Smriti Gupta Ranjeet Biswas

With the rapid application growing of internet and wireless network, information security becomes significant to protect commerce secret and personal privacy. Steganography plays crucial role for information security guarantee. There have been number of steganography embedding techniques proposed over last few years. In this paper, our goal is to evaluate number of JPEG steganography techniques...

2014
Steffen Wendzel Wojciech Mazurczyk Luca Caviglione Michael Meier

Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography. Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data. This paper provides an introduction to network steganography and highlight...

2012
Saroj Kumar

In this paper we present a classification of network security techniques such as: secrecy, authentication, non-repudiation and integrity control. The secrecy techniques are two categories: cryptography and steganography. Steganography like cryptography is a very useful technique to achieve secrecy in communication. If both cryptography and steganography are used then the communication becomes t...

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

2014
Ramandeep kaur Jitender Sharma

Today, communication is main part of everybody’s life. Security is the most important issue in any communication. So we need a secured system to exchange data securely between users. For this purpose of security there are various techniques like cryptography, watermarking and steganography. Steganography is used to transmit information in covered form. In steganography we hide the presence of d...

2014
Ramandeep kaur Arshdeep Singh Chunfang Yang Fenlin Liu Xiangyang Luo

Steganography is a technique to hide/protect the information. Many people are using this technique to hide their malicious data, so that such data can not be intercepted easily. This paper deals with a review on various Stegangraphy and Steganalysis Techniques .Different papers related to steganography, classification of steganography, video steganography were studied and reviewed. The aim is t...

Journal: :CoRR 2015
Khan Muhammad Jamil Ahmad Naeem Ur Rehman Zahoor Jan Rashid Jalal Qureshi

There are five different types of steganography based on the carrier object that is used for embedding the secret information. The carrier object may be images, text, videos, audios or network protocol packets. If the image is used as a carrier, it is called image steganography. Similarly if video is used for hiding secret messages, we call it video steganography and so on[1, 5]. The diagrammat...

2012
M. Indra Sena Reddy Purushotham Reddy K. Subba Reddy

Steganography, literally meaning “secret writing”, involves hiding a data file in another innocuous-looking file. From the time of Herodotus in Greece, to the defense mechanisms of today, steganography has been used to deny one’s adversaries the knowledge of message traffic. Steganography takes one piece of information and hides it within another. A “container file” holds the secret message in ...

2011
Mayra Bachrach Frank Y. Shih

Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today’s digital world where information is often and easily exchanged through...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید