Filters








3,243 Hits in 1.8 sec

Attacks on Steganographic Systems [chapter]

Andreas Westfeld, Andreas Pfitzmann
2000 Lecture Notes in Computer Science  
in the sense presented here, because one steganographic bit influences up to 256 pixels. ??  ...  It is calculated by integration of the density function: Flooring tile as steganogram of EzStego, and filtered; this visual attack cannot distinguish between the upper, steganographic half and the lower  ...  them once more to attacks. • Within the validation circle of steganographic systems, -this paper is -a step forward. • Our method …  ... 
doi:10.1007/10719724_5 fatcat:qpobyjsp5bfe5prax5co7lnw6a

Traffic Analysis Attacks on a Continuously-Observable Steganographic File System [chapter]

Carmela Troncoso, Claudia Diaz, Orr Dunkelman, Bart Preneel
2007 Lecture Notes in Computer Science  
Our results suggest that simple randomization techniques are not sufficient to protect steganographic file systems from traffic analysis attacks.  ...  A continuously-observable steganographic file system allows to remotely store user files on a raw storage device; the security goal is to offer plausible deniability even when the raw storage device is  ...  Hiding Data Accesses in StegFS The steganographic file systems presented in the previous section are secure towards an attacker who is able to get snapshots of the state of the file system (sufficiently  ... 
doi:10.1007/978-3-540-77370-2_15 fatcat:7bifqqljmvezlequ3nzndrvcny

Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study

Yun Q. Shi, Chunhua Che, Wen Chen, Maala P Kaundinya
2007 2007 IEEE International Symposium on Circuits and Systems  
The effect of this recompression on the performances of steganalyzers is experimentally studied and reported in this paper.  ...  In the implementation of a few JPEG steganographic schemes such as OutGuess and F5, an additional JPEG compression may take place before data embedding.  ...  Specific steganalysis launches an attack on a targeted steganographic technique, while universal steganalysis aims at all of steganographic schemes and is based on the principle of machine learning.  ... 
doi:10.1109/iscas.2007.378341 dblp:conf/iscas/ShiCCK07 fatcat:b4xt3ap5ozdohh4k4lqifbhe6a

Development of a Subsystem for Steganalysis of Digital Images Based on a Convolutional Neural Network to Detect and Prevent Attacks Using Hidden Steganographic Channels
Разработка подсистемы стегоанализа цифровых изображений на основе сверточной нейронной сети для обнаружения и предовращения атак, использующих скрытые стеганографические каналы

E. A. Yandashevskaya, Academy of the Federal Guard Service
2021 Proceedings of Tomsk State University of Control Systems and Radioelectronics  
This subsystem expands the functionality of existing intrusion detection / prevention systems in terms of detecting covert channels used in computer attacks.  ...  This article presents a way to implement the subsystem for steganalysis of digital images circulating in the information system.  ...  System) [14] и RAISE (The Raw Images Dataset) [15] , применяя для формирования стегоконтейнеров известные варианты алгоритмов с высоким соотношением скрытности к объему полезной нагрузки, такие как steGO  ... 
doi:10.21293/1818-0442-2021-24-2-29-33 fatcat:jal7njja55bmbfpid256ea3ace

Cover Processing-based Steganographic Model with Improved Security

2019 Acta Polytechnica Hungarica  
Previous research conducted in the area has mainly focused on steganography and steganalysis techniques.  ...  This paper proposes a new model for steganography called Cover Processing-based Steganographic Model (CPSM) that processes the cover objects and transmits them in a way to improve the security of steganographic  ...  Next, we will prove mathematically that applying a processing function on the cover objects can improve the security of steganographic systems.  ... 
doi:10.12700/aph.16.1.2019.1.12 fatcat:ksmb7dnymjdg5pwgox6yg2fssm

Modeling the Security of Steganographic Systems [chapter]

J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, G. Wolf
1998 Lecture Notes in Computer Science  
We present a model of steganographic systems which allows to evaluate their security.  ...  This model´s main statement is that the embedding operation of a steganographic system should work indeterministic from the attacker´s point of view. This is proved by means of information theory.  ...  Using information theory to evaluate the security of steganographic systems Borrowing from cryptology, we introduce two forms of attacks on steganographic systems: 1. stego-only-attack: The attacker knows  ... 
doi:10.1007/3-540-49380-8_24 fatcat:tu6vfwf7svdmbkabkq7e3perpa

A video steganography attack using multi-dimensional Discrete Spring Transform

Aaron Sharp, Qilin Qi, Yaoqing Yang, Dongming Peng, Hamid Sharif
2013 2013 IEEE International Conference on Signal and Image Processing Applications  
The attack is successful in defeating multiple steganographic schemes verified by determining the BER after DST attack which always remains approximately 0.5.  ...  In this paper, we will further expand upon our proposed Discrete Spring Transform (DST) steganographic attack.  ...  We believe this scheme represents a robust system that would be exceptionally difficult to combat using existing steganographic attacks.  ... 
doi:10.1109/icsipa.2013.6708000 dblp:conf/icsipa/SharpQYPS13 fatcat:pvjemaij7zfudceywnnmweafde

Development of Requirements Specification for Steganographic Systems

Dāvids Grībermans, Andrejs Jeršovs, Pāvels Rusakovs
2016 Applied Computer Systems  
The paper focuses on development of requirements specification for steganographic systems. The main concepts and fields of use of steganography are briefly explained.  ...  the required steganographic system from the developers.  ...  Geometric attacks; Cryptographic attacks; 4. Attacks against the steganographic algorithm used or the system itself.  ... 
doi:10.1515/acss-2016-0014 fatcat:nzkjsympm5fqrnuuwa7bn4da24

Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage

Ping Pan, Zeming Wu, Chen Yang, Bing Zhao
2022 Entropy  
of poor extraction ability of steganographic images under attack or interference.  ...  On the basis of ensuring the quality and concealment of steganographic images, this paper proposes a double-matrix decomposition image steganography scheme with multi-region coverage, to solve the problem  ...  A variety of image-processing attacks are performed on the steganographic image to check the robustness of the proposed scheme.  ... 
doi:10.3390/e24020246 pmid:35205541 pmcid:PMC8871221 fatcat:fahat5jp3nblths5bzjcczupjy

Real-time Attacks on Audio Steganography

Marcus Nutzinger
2012 Journal of Information Hiding and Multimedia Signal Processing  
Tests of our system show the effectiveness of the proposed techniques: The steganographic receiver is disturbed, resulting in increased bit error rates and rendering the steganographic channel unusable  ...  on any audio data.  ...  Attacks on Digital Watermarking and Steganography Systems. While [42] mentioned attacks on steganographic systems several years ago, they focused on digital images as cover media.  ... 
dblp:journals/jihmsp/Nutzinger12 fatcat:5f5jvv4wevc23cdfcamyu7s7ie

Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes

Hansong Du, Jiufen Liu, Yuguo Tian, Xiangyang Luo, Zhili Zhou
2021 Security and Communication Networks  
Focusing on the special layout characteristics of the parity-check matrix of STC, under the two attack conditions, the theoretical boundaries of the steganographic key equivocation function, the message  ...  In this manuscript, the cryptographic secrecy of this kind of steganography is analyzed, on condition of two common attacks: stego-only attack and known-cover attack, respectively, from three perspectives  ...  can be obtained by the attacker from the cover object and stego object, that is, the easier the attacker can infer the steganographic key, and the less secure the steganographic system will be. e following  ... 
doi:10.1155/2021/5495941 fatcat:4kpir5wkfnf7fimtdxpnzxqf2u

Theoretical foundations for constructing effective codewords for the code-controlled information embedding steganographic method

A.A. Kobozeva, A.V. Sokolov
2021 Radiotechnics  
Steganography is an important component of modern information security systems.  ...  This trend is conditioned by the involvement of the DCT transformants with similar frequencies that have similar resistance to possible attacks on the embedded message.  ...  system.  ... 
doi:10.30837/rt.2021.4.207.02 fatcat:5j2cc45mobdvfkga5cx6s3mt44

A Graph-theoretic Model to Steganography on Social Networks [article]

Hanzhou Wu, Wei Wang, Jing Dong, Yiliang Xiong, Hongxia Wang
2018 arXiv   pre-print
We present limited detection analysis to steganographic communication on a network.  ...  A graph-theoretic model to steganography on social networks is presented to analyze real-world steganographic scenarios.  ...  Structural Attack Structural attack relies on the network structure.  ... 
arXiv:1712.03621v5 fatcat:b2y3v3tjxfag7oupkp5j643lqi

TrustMAS: Trusted Communication Platform for Multi-Agent Systems [article]

Krzysztof Szczypiorski, Igor Margasinski, Wojciech Mazurczyk, Krzysztof Cabaj, Pawel Radziszewski
2008 arXiv   pre-print
The paper presents TrustMAS - Trusted Communication Platform for Multi-Agent Systems, which provides trust and anonymity for mobile agents.  ...  The platform includes anonymous technique based on random-walk algorithm for providing general purpose anonymous communication for agents.  ...  Multi-Agent Systems are usually implemented on platforms which are the tools that simplify implementation of specific systems.  ... 
arXiv:0808.4060v1 fatcat:6odbfbfnobc65j7gelf4ziff2q

High-Capacity Robust Image Steganography via Adversarial Network

2020 KSII Transactions on Internet and Information Systems  
The secure and robust model is the most robust against some attacks.  ...  In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further.  ...  He has served as an Associate Editor of the IEEE TRANSACTIONS ON SIGNAL PROCESSING and the IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS (II).  ... 
doi:10.3837/tiis.2020.01.020 fatcat:ko2xyinesnfklbltpslwvpvd2m
« Previous Showing results 1 — 15 out of 3,243 results