Filters








74 Hits in 4.1 sec

A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection [chapter]

René Rosenbaum, Heidrun Schumann
2000 Lecture Notes in Computer Science  
A new technical steganographic system, which uses reference colours as starting point for embedding and extraction of information has been developed and will be described.  ...  These are representation, storage and as a result also suitability for their use in steganography. Based upon this, some criteria for the choice of suitable cover images are pointed out.  ...  Cover image selection Based on the main requirement for imperceptibility of the message and the derived statements for potential covers, a suitable image has to be chosen.  ... 
doi:10.1007/3-540-44456-4_3 fatcat:pq5qdnuil5adbgxoolei6vfriu

Steganography Schemes for Data & Information Protection

Jerry A. Sarumi, Department of Computer Science, Lagos State Polytechnic, Ikorodu, Lagos, Nigeria Faculty of Computational Sciences & Informatics, Academic City University, Accra, Ghana, Olumide Babatope Longe
2021 Advances in Multidisciplinary & Scientific Research Journal Publication  
In ensuring the security of data and information researchers have come up with different schemes and techniques that can provide protection for data and information during transmission.  ...  Keywords: Watermarking, Steganography, Fingerprinting, Cryptography, Intellectual Properties, Protection, Concealment, Adaptive Image Steganography  ...  MB.Model-based steganography (MB) can be defined as a general framework for conducting both steganography and steganalysis by simply using a statistical model of the cover media.The MB method for JPEG  ... 
doi:10.22624/aims/abmic2021p7 fatcat:3qol7ysl2vdmbmy2ws6wetoauu

Secure android covert channel with robust survivability to service provider restrictions

Justin Shi, Jie Wu, Avinash Srinivasan
2017 International Journal of Security and Networks (IJSN)  
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones.  ...  Reference to this paper should be made as follows: Srinivasan, A., Wu, J. and Shi, J. (2017) 'Secure android covert channel with robust survivability to service provider restrictions', Int.  ...  Acknowledgements The authors would like to thank Chris Brahms, Stephan Reimers, and Thomas Valadez for their contributions towards the implementation and validation of Android-Stego, as well as the draft  ... 
doi:10.1504/ijsn.2017.10001806 fatcat:eyxcajq24vdcxiuf4omu2sfham

Secure android covert channel with robust survivability to service provider restrictions

Avinash Srinivasan, Jie Wu, Justin Shi
2017 International Journal of Security and Networks (IJSN)  
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones.  ...  Reference to this paper should be made as follows: Srinivasan, A., Wu, J. and Shi, J. (2017) 'Secure android covert channel with robust survivability to service provider restrictions', Int.  ...  Acknowledgements The authors would like to thank Chris Brahms, Stephan Reimers, and Thomas Valadez for their contributions towards the implementation and validation of Android-Stego, as well as the draft  ... 
doi:10.1504/ijsn.2017.081061 fatcat:6gdfpoqmora7tjedbbbfbgyrb4

Image Steganography: A Review of the Recent Advances

Nandhini Subramanian, Omar Elharrouss, Somaya Al-Maadeed, Ahmed Bouridane
2021 IEEE Access  
Li et al. in [56] has proposed a framework where a textural image is generated by a generative model and acts as a cover image.  ...  U-Net based encoder-decoder architecture is used for hiding and a CNN with 6 layers for extraction as discussed by Duan et al in [27] .  ... 
doi:10.1109/access.2021.3053998 fatcat:obezfqxgivg43mugsmmcxdceri

A Survey on Image Steganography Techniques

Kamred UdhamSingh
2014 International Journal of Computer Applications  
This paper delivers a survey on digital images steganography and covering its fundamental concepts.  ...  Specific generally used approaches for increasing steganographic security are summarized and significant research developments are also discussed.  ...  Model-Based Steganography A general framework proposed by Sallee [56] for the operating steganography and steganalysis with the help statistical model of the digital cover media.  ... 
doi:10.5120/17105-7746 fatcat:wzcy2v44njemhanl6eb5f5xrxq

High Capacity Image Steganography using Pixel Value Differencing Method with Data Compression using Neural Network

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Data Compression Provides To Hide Large Amount Of Secret Data To Increase The Capacity And The Image Steganography Based On Any Neural Network Provides That The Size And Quality Of The Stego-Image Remains  ...  The Data Hidden Capacity Inside The Cover Image Totally Depends On The Properties Of The Image Like Number Of Noisy Pixels.  ...  The framework provides an effective way to select output image to accommodate the secret information.  ... 
doi:10.35940/ijitee.l2839.1081219 fatcat:vos72p7izvcxlc5aie3nd26wrm

Biometric Inspired Digital Image Steganography

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt
2008 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems (ecbs 2008)  
We propose using human skin tone detection in colour images to form an adaptive context for an edge operator which will provide an excellent secure location for data hiding.  ...  ., against image processing and other attacks) and capacity of the hidden data (i.e., how much data we can hide in the carrier file), are the main factors that distinguish it from other "sisters-in science  ...  This method is characterized by a random adaptive selection of pixels depending on the cover image and the selection of pixels in a block with large local STD (Standard Deviation).  ... 
doi:10.1109/ecbs.2008.11 dblp:conf/ecbs/CheddadCCM08 fatcat:eyz2x6garnc3rpabw5nxcwbd2q

Information Hiding Techniques: A Tutorial Review [article]

Sabu M. Thampi
2008 arXiv   pre-print
A brief history of steganography is provided along with techniques that were used to hide information. Text, image and audio based information hiding techniques are discussed.  ...  This paper also provides a basic introduction to digital watermarking.  ...  Care needs to be taken in the selection of the cover image, so that changes to the data will not be visible in the stego-image.  ... 
arXiv:0802.3746v1 fatcat:hbrfhubuajeihgny3g6pfehwqy

Deep Learning for Predictive Analytics in Reversible Steganography [article]

Ching-Chun Chang, Xu Wang, Sisheng Chen, Isao Echizen, Victor Sanchez, Chang-Tsun Li
2022 arXiv   pre-print
A more reliable way to develop a learning-based reversible steganographic scheme is through a divide-and-conquer paradigm.  ...  The recent development of end-to-end learning has made it possible to bypass multiple intermediate stages of steganographic operations with a pair of encoder and decoder neural networks.  ...  The authors would like to thank the anonymous reviewers and the associate editor for their insightful comments and valuable suggestions that helped improve the quality of the article.  ... 
arXiv:2106.06924v2 fatcat:frp7oyqhinajlflhtsvvudxss4

A Language Independent Platform for High Secured Communication Using Encrypted Steganography

Vijayaratnam Ganeshkumar, Ravindra L. W. Koggalage
2012 Computer Science and Engineering  
And each steganographic algorithms had independent implementation; as a resultthere is no generic framework or application that will produce stegano medium for an end-user.  ...  And also this paper describes a newly invented steganographic technique which utilizes the inter-character spacing of a Rich-Text-Format (RTF) document.  ...  Marcelo Bossi, Senior Manager Business Development at PGP Corporation who has given extensive support by providing PGP SDK evaluation copy for our research, and also Mr.  ... 
doi:10.5923/j.computer.20120205.02 fatcat:b3gym5ksavhmpiuvmilpukgxeq

Digital image steganography: Survey and analysis of current methods

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt
2010 Signal Processing  
., image, audio, and video files.  ...  This paper concludes with some recommendations and advocates for the object-oriented embedding mechanism.  ...  Steganography urges that the cover image must be carefully selected. A familiar image should not be used, it is better for steganographers to create their own images [121] .  ... 
doi:10.1016/j.sigpro.2009.08.010 fatcat:4kn2rpavfrdgrdgtfi7uv7f5ji

Adaptive Steganography: A survey of Recent Statistical Aware Steganography Techniques

Manish Mahajan, Navdeep Kaur
2012 International Journal of Computer Network and Information Security  
Occasionally and especially when referring to image steganography, the cover image is known as the container.  ...  The permutation is relative to a reference ordering that encoder and decoder derive from the mesh connectivity in a consistent manner.  ... 
doi:10.5815/ijcnis.2012.10.08 fatcat:ch4f2rzk6rgrdirwqivws3mu7q

Enhancing Steganography in Digital Images

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt
2008 2008 Canadian Conference on Computer and Robot Vision  
We call it adaptive as we select the specific Region of Interest (ROI) in the cover image where we can safely embed our data. We chose these regions based on human skin tone colour detection.  ...  Steganalysis, which is the official counter attack science, has defeated Steganographic algorithms whether they are based on the traditional spatial domain or the transform domain.  ...  Nevertheless, the deficiency of the proposed framework is the limited payload caused by our careful selection of salient points that can resist YCbCr compression and because of the region based spirit  ... 
doi:10.1109/crv.2008.54 dblp:conf/crv/CheddadCCM08 fatcat:tu3pj76offhftfqei2buvj5mde

JPEG Compression Steganography & Crypography Using Image-Adaptation Technique

Meenu Kumari, A. Khare, Pallavi Khare
2010 Journal of Advances in Information Technology  
This paper is a combination of steganography and encryption algorithms, which provides a strong backbone for its security.  ...  them in a digital image file using the local characteristics within an image.  ...  The views and conclusions contained herein are those of the authors and the paper contains the original work of the authors. We took help from many books, papers and other materials.  ... 
doi:10.4304/jait.1.3.141-145 fatcat:qsnebew7azfytmy2zptyowpse4
« Previous Showing results 1 — 15 out of 74 results