Filters








563 Hits in 2.7 sec

An Overview of Digital Image Steganography

Poornima R, Iswarya R.J
2013 International Journal of Computer Science & Engineering Survey  
Hiding Capacity plays a vital role for efficient covert communication. This is achieved by Steganography.  ...  In this paper, a highcapacity Image Steganography schemes are discussed for different file formats. Covert communication is taking place by encrypting the password for information to be protected.  ...  The aim of the covert communication is to hide the fact that the communication is being occurred. Covert communication ensures privacy.  ... 
doi:10.5121/ijcses.2013.4102 fatcat:j4wbzztehza4lnk7jv6mhvwmju

Discovering Hidden Evidence

Chet Hosmer
2006 Journal of Digital Forensic Practice  
There is legitimate doubt about how extensively steganography is used by criminals and spies, 2 but the technology for covert communication and evidence concealment is readily available.  ...  Steganography is here, and combined with the Internet and peer to peer networking, it provides criminals, gangs and terrorists with a viable and covert method of communication with guaranteed evidence  ...  JPEG images are "Lossy Compressed" meaning that information is lost during the compression process.  ... 
doi:10.1080/15567280500541447 fatcat:tmfo3ir2rza2vozqdqlzh6ekc4

Stegobot: A Covert Social Network Botnet [chapter]

Shishir Nagaraja, Amir Houmansadr, Pratch Piyawongwisal, Vijit Singh, Pragya Agarwal, Nikita Borisov
2011 Lecture Notes in Computer Science  
Instead, it is based on a model of covert communication over a social-network overlay -bot to botmaster communication takes place along the edges of a social network.  ...  Further, bots use image steganography to hide the presence of communication within image sharing behavior of user interaction.  ...  Newman et al. in [18] propose JPEG-compatibility-steganalysis resistant method, which embeds the message into the spatial domain of the image before performing the JPEG compression.  ... 
doi:10.1007/978-3-642-24178-9_21 fatcat:cf7yn4ru5nfa3ozskjkmttxq6e

Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method

Yang Wu, Weiping Shang, Jiahao Chen
2019 Computers Materials & Continua  
Thus, it is easy to cover up the stego images and the identities of covert communication users when the covert channel is established on such networks.  ...  Robust data hiding techniques attempt to construct covert communication in a lossy public channel.  ...  Anti-JPEG compression experiments In this section, the 10,000 JPEG images compressed with QF=75 is generated from BOSSbase 1.01 image database.  ... 
doi:10.32604/cmc.2019.05194 fatcat:trwoaopdyzgj7ojqr326coxidm

An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography [article]

Minati Mishra, M. C. Adhikary
2014 arXiv   pre-print
Lawyers and Politicians use tampered images to direct the opinion of people or court to their favor. Terrorists, anti-social groups use manipulated Stego images for secret communication.  ...  Digitization of image was a revolutionary step for the fields of photography and Image processing as this made the editing of images much effortless and easier.  ...  JPEG Compression JPEG (Joint Photographic Experts Group) is an international compression standard for continuous-tone grayscale and color still images.  ... 
arXiv:1407.6877v1 fatcat:ap4jxqj7czddhpqttn3gchswfe

Using Facebook for Image Steganography [article]

Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj
2015 arXiv   pre-print
This paper explores a method to minimize the disruption so JPEG images can be used as steganography carriers on Facebook.  ...  The compression process generally disrupts attempts to use Facebook for image steganography.  ...  ACKNOWLEDGMENT Krzysztof Szczypiorski was supported by the European Union in the framework of European Social Fund through the Warsaw University of Technology Development Programme.  ... 
arXiv:1506.02071v1 fatcat:azsbmkxdgvdfveobfivj7yziaa

Resisting Blind Steganalysis in Real Time Covert Communication

Milav Dabgar, Priti Muliya, Ashish Purani
2015 International Journal of Computer Applications  
In this work, we review recent developments in the field of steganography keeping real time covert communication applications in mind.  ...  This whole process repeats for all the blocks and at the output of Stego_Top we finally receive compensated Stego image pixels.  ...  Stego_Pxl: the final output JPEG Stego image which contains the hidden message bit stream is flushed out through this pins pixel by pixel.  ... 
doi:10.5120/21259-4125 fatcat:vxd4du7waff4faloraove446hu

Secure android covert channel with robust survivability to service provider restrictions

Avinash Srinivasan, Jie Wu, Justin Shi
2017 International Journal of Security and Networks (IJSN)  
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones.  ...  However, the potential for use of smartphones -communicating over cellular service provider networks -has yet to be fully explored.  ...  All images of size ≥ 1 MB were compressed (and converted to JPEG) by the native MMS application.  ... 
doi:10.1504/ijsn.2017.081061 fatcat:6gdfpoqmora7tjedbbbfbgyrb4

Secure android covert channel with robust survivability to service provider restrictions

Justin Shi, Jie Wu, Avinash Srinivasan
2017 International Journal of Security and Networks (IJSN)  
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones.  ...  However, the potential for use of smartphones -communicating over cellular service provider networks -has yet to be fully explored.  ...  All images of size ≥ 1 MB were compressed (and converted to JPEG) by the native MMS application.  ... 
doi:10.1504/ijsn.2017.10001806 fatcat:eyxcajq24vdcxiuf4omu2sfham

Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing

Chuan Qin, Weiming Zhang, Xinpeng Zhang
2018 Multimedia tools and applications  
Multimedia applications are omnipresent in our daily lives, however, a lot of relevant security issues have emerged as well, such as covert communication using multimedia files, copy-move forgery in digital  ...  To address these issues, many multimedia information security techniques were proposed by utilizing the methods in areas like machine learning, signal and image processing, and communications.  ...  But, the extraction of hidden messages, i.e., extraction attack, is also an important task for obtaining the evidence of covert communication.  ... 
doi:10.1007/s11042-018-5831-x fatcat:x3tdme6i7vhrbbfrxgpbl44f4a

Channel models for high-capacity information hiding in images

Johann A. Briffa, Manohar Das, Mark S. Schmalz
2003 Mathematics of Data/Image Coding, Compression, and Encryption V, with Applications  
We consider the scenario of blind information hiding in images as a communications channel, where the channel noise is caused by the embedding and blind extraction method as well as by any lossy compression  ...  method utilized to store and transmit the image.  ...  Before decoding, however, we pass the stego-image through a JPEG compression/decompression cycle for quality settings 0-12 (in Adobe Photoshop's TIFF JPEG encoding).  ... 
doi:10.1117/12.451259 fatcat:2ipzpdeq7vfbdkkokmkq52rkqa

Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

Avinash Srinivasan, Jie Wu, Justin Shi
2015 Proceedings of the 8th International Conference on Mobile Multimedia Communications  
Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint.  ...  Today, smartphones which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel.  ...  All images of size ≥ 1MB were compressed (and converted to JPEG) by the native MMS application. Smaller images remained intact.  ... 
doi:10.4108/icst.mobimedia.2015.259071 dblp:journals/amsys/Srinivasan0S15 fatcat:7ekdwtjmpbcplpklicwhgxp3gi

Secure Steganography in Multimedia Content

Miroslav Goljan, Andreas Westfeld
2009 EURASIP Journal on Information Security  
JPEG compression format for images became the one that attracts steganographers the most.  ...  Steganography, known as the art of covert communication, entered digital world about ten years ago.  ... 
doi:10.1155/2009/257131 fatcat:3gbykox5njbe7a7kh7m7lxaaku

Secure Steganography in Multimedia Content

Miroslav Goljan, Andreas Westfeld
2009 EURASIP Journal on Information Security  
JPEG compression format for images became the one that attracts steganographers the most.  ...  Steganography, known as the art of covert communication, entered digital world about ten years ago.  ... 
doi:10.1186/1687-417x-2009-257131 fatcat:hn2wfemyazc7bp52tkj25wyswm

Robust and brittle secured video for IOT

K Lakshmi Narayanan, G P. Ramesh, V Divya
2018 International Journal of Engineering & Technology  
imaging in the Iot and for the high quality compression files and secured transformation of image and video captured in the digital camera.  ...  This process produces high quality JPEG, and high PSNR ratio. The scrambling algorithm is used in the encryption process. It is used for providing secured image.  ...  The process in which JPEG achieves higher compression ratio with smaller size.  ... 
doi:10.14419/ijet.v7i2.20.11762 fatcat:5vbfdxlxyffjhiykouhoq6kbna
« Previous Showing results 1 — 15 out of 563 results