نتایج جستجو برای: steganography

تعداد نتایج: 3630  

2014
Ruchi Jain Bhanu Pratap Singh

Now-a-days a fast growth of internet in the present world, social networking websites like Twitter& Facebook are being increasingly used by individuals of all over the world to share their life activities and events via images. But this vastly popular observable fact of image sharing on internet is exposed to a lot of risks. At present, these social networking websites are not bounded by string...

2009
Naofumi Aoki

Steganography may be employed for secretly transmitting side information in order to improve the performance of signal processing such as packet loss concealment and band extension of telephony speech. The previous studies employ LSB replacement technique for embedding steganogram information into speech data. Instead of such a lossy steganography technique, this study proposes a lossless stega...

Journal: :I. J. Network Security 2015
Amitava Nag Sushanta Biswas Debasree Sarkar Partha Pratim Sarkar

Steganography is the branch of information hiding for secret communication. The simplest and widely used steganography is the LSB based approach due to its visual quality with high embedding capacity. However, LSB based steganography techniques are not secure against statistical steganalysis mainly χ2 attack and Regular Singular (RS) attack. These two staganalysis can easily estimate the hidden...

2014
Unik Lokhande

Hiding data is a very important thing nowadays as the data travels over various unsecure networks. To avoid this problem cryptography is used which hides the data or scrambles your message, but cryptography alone cannot provide total security as the message is still available to perform cryptanalysis. Steganography hides the existence of the message. Most of the peoples use either cryptography ...

2016
Ratnakirti Roy Suvamoy Changder

Steganography techniques find importance in military applications because of their ability to communicate covertly. It is evident for any image steganography technique that if the payload can be represented in a smaller dimension than its original form, then the actual embedding requirement can be lessened thereby improving the statistical imperceptibility of the method. This paper presents an ...

2016
Manashee Kalita Themrichon Tuithung Hong-Juan Zhang Hong-Jun Tang

Transmitting data from sender to authorized receiver through a public media (insecure media) with full security is a challenging task. From the ancient time, different methods and techniques have been adopted to gain secure transmission of information. With the development of new technologies, the techniques used for securing information have also changed. The three main technology used for sec...

2014
Harleen Kaur Surinder Kaur

In this paper we will overview how data hiding can be done using Cryptography. Basically, we will describe how one can use Steganography for hiding data with Cryptography. Cryptography and Steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting confident...

2006
Andreas Westfeld

Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems. However, new problems for cryptographic mechanisms arise from the context of steganography. There are two sorts of steganographic tools: commercial tools with insecure or badly implemented cryptography and academic proof-of-concepts...

Journal: :Digital Investigation 2005
Brent T. McBride Gilbert L. Peterson Steven C. Gustafson

Steganography is the art of hiding a message in plain sight. Modern steganographic tools that conceal data in innocuous-looking digital image files are widely available. The use of such tools by terrorists, hostile states, criminal organizations, etc., to camouflage the planning and coordination of their illicit activities poses a serious challenge. Most steganography detection tools rely on si...

2012
Ramanpreet Kaur Baljit Singh Ishpreet Singh

ABSTRACT: Steganography hides the existence of the data inside any cover file. There are different file formats used in steganography like text, image, audio and video. Out of these file formats image steganography is followed in this paper .One of the major objective of hiding data using image steganography is to hide the data in an image, so that the changes in the intensity of the colors of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید