نتایج جستجو برای: network steganography

تعداد نتایج: 675311  

2011
K. Venkata Ramana

-The internet and the World Wide Web have revolutionized the way in which digital data is distributed. The growing possibilities of modern communication need special means of security especially on computer network. In this paper a new randomized secure data hiding algorithm using file hybridization is proposed for strengthening the security of information through a combination of cryptography ...

Journal: :IEEE Access 2021

Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret hidden in way that it not visible to human eyes. Deep learning technology, has emerged as powerful tool various applications including steganography, received increased attention recently. main goal this paper explore and discuss deep methods available steganography field....

Journal: :Electronics 2022

The purpose of video steganography is to hide messages in the file and prevent them from being detected, finally secret message can be extracted completely at receiver. In this paper, an end-to-end based on GAN multi-scale deep learning network proposed, which consists encoder, decoder discriminator. However, transmission process, videos will inevitably encoded. Thus, a noise layer introduced b...

2004
Andrew D. Ker

We consider methods for answering reliably the question of whether an image contains hidden data; the focus is on grayscale bitmap images and simple LSB steganography. Using a distributed computation network and a library of over 30,000 images we have been carefully evaluating the reliability of various steganalysis methods. The results suggest a number of improvements to the standard techiques...

2013
Boina Avinash Kumar Madhusmita Das Madhusmita Sahu

Steganography is the art and science of hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an intermediate attacker .This paper will discuss about pure steganographic technique, which does not require prior exchange of data like shared-keys. The proposed technique use a secure mask generation technique and the masking of original data re...

Journal: :CoRR 2014
Manisha Rana Rohit Tanwar

-With the advancement of communication technology, data is exchanged digitally over the network. At the other side the technology is also proven as a tool for unauthorized access to attackers. Thus the security of data to be transmitted digitally should get prime focus. Data hiding is the common approach to secure data. In steganography technique, the existence of data is concealed. GA is an em...

2001
Jonathan Watkins

Steganography is the process of hiding one medium of communication (text, sound or image) within another. This paper will discuss the tools used to both hide and unhide (know as Steganalysis) information. A look at the history starting with Herodotus in ancient Greece describing secret messages written in wax on stone tablets, to world war two’s secret double meaning Nazi messages and British I...

Journal: :International Journal of Computer Applications Technology and Research 2013

Journal: :EURASIP Journal on Image and Video Processing 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید