541 Hits in 6.3 sec

A New Parallel Message-distribution Technique for Cost-based Steganography [article]

Mehdi Sharifzadeh, Chirag Agarwal, Mahdi Salarian, Dan Schonfeld
2019 arXiv   pre-print
The result is then used to prove sub-optimality of the message distribution technique used by all cost based algorithms including HUGO, S-UNIWARD, and HILL.  ...  Second, a new distribution approach is presented to further improve the security of these algorithms.  ...  In Section 3, we present a new embedding technique using parallel images. The main contribution of this paper, a new message distribution method is presented in 4.  ... 
arXiv:1705.08616v2 fatcat:3vzcnxy6vfebzi3l53sqq4b6om

GANash – A GAN approach to steganography [article]

Venkatesh Subramaniyan, Vignesh Sivakumar, A. K. Vagheesan, S. Sakthivelan, K. J. Jegadish Kumar, K. K. Nagarajan
2021 arXiv   pre-print
The work that has been accomplished by MIT for this purpose, a deep-neural model by the name of SteganoGAN, has shown obligation for using this technique for steganography.  ...  A complementary technique that is popularly used to insure security is steganography.  ...  ACKNOWLEDGEMENTS We would like to thank Raviteja Vuppaladhadiyam and Harine Govindarajan from Sri Sivasubramaniya Nadar College of Engineering for assisting and proofreading the work.  ... 
arXiv:2110.13650v1 fatcat:w6siryi6yja4hfgmyn7mpe74g4

StegBlocks: ensuring perfect undetectability of network steganography [article]

Wojciech Fraczek, Krzysztof Szczypiorski
2015 arXiv   pre-print
The paper presents StegBlocks, which defines a new concept for performing undetectable hidden communication. StegBlocks is a general approach for constructing methods of network steganography.  ...  The objects are dependent on a specific network protocol (or application) used as a carrier for a given network steganography method.  ...  CONCLUSIONS In this paper, a new concept for performing undetectable network steganography communication, called StegBlocks, was presented.  ... 
arXiv:1506.02311v1 fatcat:vgstp2mx3bh4dot722v7eo2mry

A New Service Oriented Arcitucture for Data Hiding

Sepideh Ravanbakhsh, Ravanbakhsh Fesharaki
2012 Computer Science and Engineering  
The paper illustrates a distributed frame work based on service oriented architecture, on which a logical transparent steganographic layer is developed.  ...  Because of the open structure of the system, varieties of steganography algorithms can be supported for varieties of secrets, according to an evaluation strategy which is also considered as a service on  ...  Then we take a look at the service oriented architecture and its potentials to set up a distributed steganography framework.  ... 
doi:10.5923/ fatcat:its67wzlxfcltcuozqmsxbanym

A Review on Structured Scheme Representation on Data Security Application

Siti Norussaadah Mohd Salleh, Roshidi Din, Nur Haryani Zakaria, Aida Mustapha
2018 Indonesian Journal of Electrical Engineering and Computer Science  
This paper presents a review of structured-scheme representation for data security application.  ...  Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication.  ...  Steganography is a technique of hiding information.  ... 
doi:10.11591/ijeecs.v11.i2.pp733-739 fatcat:zr32ik5qcnflvlgr2lcebtdxui

VoIP Steganography and Its Detection - A Survey [article]

Wojciech Mazurczyk
2013 arXiv   pre-print
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to secret information into a carrier message.  ...  carrier for steganographic purposes.  ...  Krzysztof Szczypiorski from Warsaw University of Technology (Poland) for helpful comments and remarks.  ... 
arXiv:1203.4374v4 fatcat:alz2kjbcszhvvgx6e7gmsqnx2i

Recent Advances of Image Steganography with Generative Adversarial Networks

Jia Liu, Yan Ke, Zhuo Zhang, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang
2020 IEEE Access  
Image steganography is an information security technique aiming at hiding secret messages in common digital images for covert communication.  ...  We discuss the characteristics of the three strategies of GAN-based steganography and analyze their evaluation metrics.  ...  However, because the message is relevant to the generator. You need to repeatedly prepare a new generator when a new message needs to be hidden.  ... 
doi:10.1109/access.2020.2983175 fatcat:fdakxe2m2rbcjdcebszweripta

A novel approach for Linguistic steganography evaluation based on artificial neural networks

R Gurunath, Ahmed H. Alahmadi, Debabrata Samanta, Mohammad Zubair Khan, Abdulrahman Alahmadi
2021 IEEE Access  
This study looks at evaluation of an AI-based statistical language model for text Steganography.  ...  This paper proposes the positive aspects of NLP-based Markov chain model for an auto-generative cover text.  ...  For digital photos, a new transform domain steganography approach based on integer wavelet transform (IWT) was utilised, as well as a chaotic map.  ... 
doi:10.1109/access.2021.3108183 fatcat:or6kkpbyqncwnnyhvazzxdndsi

VoIP steganography and its Detection—A survey

Wojciech Mazurczyk
2013 ACM Computing Surveys  
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message.  ...  carrier for steganographic purposes.  ...  ACKNOWLEDGMENTS The author would like to thank Professor Krzysztof Szczypiorski from Warsaw University of Technology (Poland) for helpful comments and remarks.  ... 
doi:10.1145/2543581.2543587 fatcat:wqp7bqe4v5bpvlphrjncqcjici

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats [article]

Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier
2014 arXiv   pre-print
This paper provides an introduction to network steganography and highlights its potential application for harmful purposes.  ...  Network steganography is the art of hiding secret information within innocent network transmissions. Recent findings indicate that novel malware is increasingly using network steganography.  ...  In comparison to cryptography, steganography aims at hiding the existence of a secret message while cryptography aims on hiding the content of a message.  ... 
arXiv:1407.2029v1 fatcat:5lxmcprh6zf4fd6a5csuqv53oq

Development Trends in Steganography [article]

Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski
2013 arXiv   pre-print
Steganography is a general term referring to all methods for the embedding of additional secret content into some form of carrier, with the aim of concealment of the introduced alterations.  ...  The choice of the carrier is nearly unlimited, it may be an ancient piece of parchment, as well as a network protocol header.  ...  This channel would be based on a number of dedicated bits of the message authentication.  ... 
arXiv:1202.5289v2 fatcat:62k4btbj4bhh5czjwdj7f4dnly

Review on the Advancements of DNA Cryptography [article]

Beenish Anam, Kazi Sakib, Md. Alamgir Hossain, Keshav Dahal
2010 arXiv   pre-print
Currently it is in the development phase and it requires a lot of work and research to reach a mature stage.  ...  DNA cryptography uses DNA as the computational tool along with several molecular techniques to manipulate it. Due to very high storage capacity of DNA, this field is becoming very promising.  ...  ACKNOWLEDGMENT The Erasmus Mundus project eLINK -east-west Link for Innovation, Networking and Knowledge exchange programme (EM ECW SGA2008-4949) for funding this study.  ... 
arXiv:1010.0186v1 fatcat:u6b3tvw2vbfvthkbfde43kiwwm

JPEG steganography with particle swarm optimization accelerated by AVX

Vaclav Snasel, Pavel Kromer, Jakub Safarik, Jan Platos
2019 Concurrency and Computation  
License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited and is not used for commercial purposes.  ...  Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels.  ...  The use of AVX can also improve the power costs and energy efficiency of various computations. 14, 15 It represents a CPU-based alternative to GPU parallelization that is implemented in modern CPUs and  ... 
doi:10.1002/cpe.5448 fatcat:e45t4gadafgvbcr7oko56pfpne

Three-Dimensional Mesh Steganography and Steganalysis: A Review [article]

Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu
2021 arXiv   pre-print
In this article, we provide a systematic survey of the literature on 3-D mesh steganography and steganalysis.  ...  Compared with an earlier survey [1], we propose a new taxonomy of steganographic algorithms with four categories: 1) two-state domain, 2) LSB domain, 3) permutation domain, and 4) transform domain.  ...  For a normal mesh, the distribution of the statistical variable of the bin is usually close to a uniform distribution, for example, the expected average value of the statistical variable is 1/2.  ... 
arXiv:2104.10203v1 fatcat:55z2mdrgtvhy3pb63c4ai6gbdy

Reversible Linguistic Steganography With Bayesian Masked Language Modeling

Ching-Chun Chang
2022 IEEE Transactions on Computational Social Systems  
The use of a digital signature is a common cryptographic technique for text authentication.  ...  We use a pre-trained transformer neural network for masked language modeling and embed messages in a reversible manner via predictive word substitution.  ...  The parallel routing takes account of predictive uncertainty and constructs an adaptive path for message embedding.  ... 
doi:10.1109/tcss.2022.3162233 fatcat:2ohcoldqbzhyrlgahl62isc4bm
« Previous Showing results 1 — 15 out of 541 results