Filters








401 Hits in 4.1 sec

A framework for avoiding steganography usage over HTTP

Jorge Blasco, Julio Cesar Hernandez-Castro, José María de Fuentes, Benjamín Ramos
2012 Journal of Network and Computer Applications  
In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP).  ...  Furthermore, our framework could be used by web servers administrators to ensure that their machines are not being abused, for example, as anonymous steganographic mailboxes.  ...  We have proposed a framework to limit the usage of steganography and covert channels through HTTP.  ... 
doi:10.1016/j.jnca.2011.10.003 fatcat:ybhlvzs735b2djeshcqydegqka

Forensic analysis of video steganography tools

Thomas Sloan, Julio Hernandez-Castro
2015 PeerJ Computer Science  
The results presented in this work can also be seen as a useful resource for forensic examiners to determine the existence of any video steganography materials over the course of a computer forensic investigation  ...  Additionally, there is increasing research interest towards the use of video as a media for steganography, due to its pervasive nature and diverse embedding capabilities.  ...  To further evaluate the merits of this approach, but also to investigate the prevalence of video steganography usage on the internet, we are currently working on a general framework, the Steganalytic wEbrEsearch  ... 
doi:10.7717/peerj-cs.7 fatcat:glftf3e54fa5ngzd6lqrtd7dnm

Dismantling OpenPuff PDF steganography

Thomas Sloan, Julio Hernandez-Castro
2018 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
We show that our findings allow us to accurately detect the presence of OpenPuff steganography over the PDF format by using a simple script.  ...  this steganography tool.  ...  Introduction Steganography is the process of hiding information in plain sight. This can be used to carry out secret communications or avoid suspicion over the exchange of information.  ... 
doi:10.1016/j.diin.2018.03.003 fatcat:hppydjtlp5cprnhazzcl6x6miq

DIGITAL DATA PROTECTION USING STEGANOGRAPHY

R. Rejani, D. Murugan, Deepu V. Krishnan
2016 ICTACT Journal on Communication Technology  
To avoid hacking the proposed framework also makes use of self-checks in a random manner.  ...  Huge companies that make specialized software often employ complex hardware methods such as usage of dongles to avoid software piracy.  ...  Furthermore, it enables a fine-grained control over the distributed software.  ... 
doaj:2f9b5ff866dd43478a4ace9fb0055a25 fatcat:f5hw5crejjcohekacixzirlgvy

Secure android covert channel with robust survivability to service provider restrictions

Avinash Srinivasan, Jie Wu, Justin Shi
2017 International Journal of Security and Networks (IJSN)  
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones.  ...  However, the potential for use of smartphones -communicating over cellular service provider networks -has yet to be fully explored.  ...  Acknowledgements The authors would like to thank Chris Brahms, Stephan Reimers, and Thomas Valadez for their contributions towards the implementation and validation of Android-Stego, as well as the draft  ... 
doi:10.1504/ijsn.2017.081061 fatcat:6gdfpoqmora7tjedbbbfbgyrb4

Secure android covert channel with robust survivability to service provider restrictions

Justin Shi, Jie Wu, Avinash Srinivasan
2017 International Journal of Security and Networks (IJSN)  
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones.  ...  However, the potential for use of smartphones -communicating over cellular service provider networks -has yet to be fully explored.  ...  Acknowledgements The authors would like to thank Chris Brahms, Stephan Reimers, and Thomas Valadez for their contributions towards the implementation and validation of Android-Stego, as well as the draft  ... 
doi:10.1504/ijsn.2017.10001806 fatcat:eyxcajq24vdcxiuf4omu2sfham

The New Threats of Information Hiding: the Road Ahead [article]

K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, S. Zander
2018 arXiv   pre-print
Compared to cryptography, steganography is a less discussed domain.  ...  However, there is a recent trend of exploiting various information hiding techniques to empower malware, for instance to bypass security frameworks of mobile devices or to exfiltrate sensitive data.  ...  AdGholas avoids detection by using steganography for hiding encrypted JavaScript code in images, text and HTML code.  ... 
arXiv:1801.00694v1 fatcat:vwbm4xcpknbrfduj7w5c4w56ty

Steganography in Modern Smartphones and Mitigation Techniques [article]

Wojciech Mazurczyk, Luca Caviglione
2014 arXiv   pre-print
Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014.  ...  To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information.  ...  Thus bots can simply retrieve data by issuing an HTTP GET to a public Twitter account.  ... 
arXiv:1410.6796v1 fatcat:2fv2fi6jlrbcpecfnlzqhl4w4q

A Language Independent Platform for High Secured Communication Using Encrypted Steganography

Vijayaratnam Ganeshkumar, Ravindra L. W. Koggalage
2012 Computer Science and Engineering  
Computer usage is increasing, for both social and business areas, and it will continue to do so.  ...  Steganography is a method of letteringsecret messages in a way that nobody except for the sender and the recipient would suspect the existence of the hidden message.  ...  Marcelo Bossi, Senior Manager Business Development at PGP Corporation who has given extensive support by providing PGP SDK evaluation copy for our research, and also Mr.  ... 
doi:10.5923/j.computer.20120205.02 fatcat:b3gym5ksavhmpiuvmilpukgxeq

Steganography in Modern Smartphones and Mitigation Techniques

Wojciech Mazurczyk, Luca Caviglione
2015 IEEE Communications Surveys and Tutorials  
Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014.  ...  To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information.  ...  Thus bots can simply retrieve data by issuing an HTTP GET to a public Twitter account.  ... 
doi:10.1109/comst.2014.2350994 fatcat:o5pidu5fdvg6xet3sorq3jc3va

Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer

Michael J. Pelosi, Nimesh Poudel, Pratap Lamichhane, Danyal Badar Soomro
2018 Advances in Science, Technology and Engineering Systems  
In this paper, we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption and demonstrate the software which implements this methodology.  ...  In this extended reprint, we introduce additional application and discussion regarding cold storage of crypto-currency account and password information, as well as applications for secure transfer in hostile  ...  Introduction In this paper, we introduce a comprehensive steganography software system and platform framework based on One-Time Pad (OTP) encryption and adaptive steganography technology.  ... 
doi:10.25046/aj030232 fatcat:7ix3vxtehrfajiwywh6rkvsfqy

Anti-forensic Approach to Remove StegoContent from Images and Videos

P. P. Amritha, M. Sethumadhavan, R. Krishnan, Saibal Kumar Pal
2019 Journal of Cyber Security and Mobility  
Covert transmission of information hidden in different media to either a general or targeted audience constitutes steganography.  ...  Our procedure has been tested on a variety of steganographic algorithms including HUGO-BD, WOW, Synch and J-UNIWARD.  ...  [25] suggest a framework to forbid the steganography usage through HTTP. Different sanitizers that eliminate hidden content from any kind of information transmitted through HTTP were proposed.  ... 
doi:10.13052/jcsm2245-1439.831 fatcat:tjclcuazszcajj24kdxyblgabi

StegoWall: blind statistical detection of hidden data

Sviatoslav V. Voloshynovskiy, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun, Edward J. Delp III, Ping W. Wong
2002 Security and Watermarking of Multimedia Contents IV  
The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework.  ...  Solving this problem calls for the development of an architecture for blind stochastic hidden data detection in order to prevent unauthorized data exchange.  ...  Steganography The steganography, originally designed for cover or hidden communications, should provide a certain level of security for public communications.  ... 
doi:10.1117/12.465324 dblp:conf/sswmc/VoloshynovskiyH02 fatcat:6o2jvywucnhsrglikw4eez5m6q

Attention Based Data Hiding with Generative Adversarial Networks

Chong Yu
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Its application on data generation is the most common usage. In this paper, we propose the novel end-to-end framework to extend its application to data hiding area.  ...  Through the qualitative, quantitative experiments and analysis, this novel framework shows compelling performance and advantages over the current state-of-the-art methods in data hiding applications.  ...  Paper (Zhu et al. 2018) introduces HiD-DeN, which is an end-to-end trainable framework that works for both steganography and watermarking applications.  ... 
doi:10.1609/aaai.v34i01.5463 fatcat:t22heekf25fhjghym5z6uaodna

Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research

Doaa A. Shehab, Mohmmed J. Alhaddad
2022 Symmetry  
In addition, it provides a deep review and summarizes recent steganalysis approaches and techniques for audio, images, and video.  ...  Finally, the existing shortcomings and future recommendations in this field are discussed to present a useful resource for future research.  ...  The authors, therefore, acknowledge with thanks DSR for technical and financial support. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym14010117 fatcat:s2oinfxtbjcdhjvdv7vqrs6jlm
« Previous Showing results 1 — 15 out of 401 results