A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Overview of Digital Image Steganography
2013
International Journal of Computer Science & Engineering Survey
Hiding Capacity plays a vital role for efficient covert communication. This is achieved by Steganography. ...
In this paper, a highcapacity Image Steganography schemes are discussed for different file formats. Covert communication is taking place by encrypting the password for information to be protected. ...
The aim of the covert communication is to hide the fact that the communication is being occurred. Covert communication ensures privacy. ...
doi:10.5121/ijcses.2013.4102
fatcat:j4wbzztehza4lnk7jv6mhvwmju
Discovering Hidden Evidence
2006
Journal of Digital Forensic Practice
There is legitimate doubt about how extensively steganography is used by criminals and spies, 2 but the technology for covert communication and evidence concealment is readily available. ...
Steganography is here, and combined with the Internet and peer to peer networking, it provides criminals, gangs and terrorists with a viable and covert method of communication with guaranteed evidence ...
JPEG images are "Lossy Compressed" meaning that information is lost during the compression process. ...
doi:10.1080/15567280500541447
fatcat:tmfo3ir2rza2vozqdqlzh6ekc4
Stegobot: A Covert Social Network Botnet
[chapter]
2011
Lecture Notes in Computer Science
Instead, it is based on a model of covert communication over a social-network overlay -bot to botmaster communication takes place along the edges of a social network. ...
Further, bots use image steganography to hide the presence of communication within image sharing behavior of user interaction. ...
Newman et al. in [18] propose JPEG-compatibility-steganalysis resistant method, which embeds the message into the spatial domain of the image before performing the JPEG compression. ...
doi:10.1007/978-3-642-24178-9_21
fatcat:cf7yn4ru5nfa3ozskjkmttxq6e
Anti-JPEG Compression Steganography Based on the High Tense Region Locating Method
2019
Computers Materials & Continua
Thus, it is easy to cover up the stego images and the identities of covert communication users when the covert channel is established on such networks. ...
Robust data hiding techniques attempt to construct covert communication in a lossy public channel. ...
Anti-JPEG compression experiments In this section, the 10,000 JPEG images compressed with QF=75 is generated from BOSSbase 1.01 image database. ...
doi:10.32604/cmc.2019.05194
fatcat:trwoaopdyzgj7ojqr326coxidm
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography
[article]
2014
arXiv
pre-print
Lawyers and Politicians use tampered images to direct the opinion of people or court to their favor. Terrorists, anti-social groups use manipulated Stego images for secret communication. ...
Digitization of image was a revolutionary step for the fields of photography and Image processing as this made the editing of images much effortless and easier. ...
JPEG Compression JPEG (Joint Photographic Experts Group) is an international compression standard for continuous-tone grayscale and color still images. ...
arXiv:1407.6877v1
fatcat:ap4jxqj7czddhpqttn3gchswfe
Using Facebook for Image Steganography
[article]
2015
arXiv
pre-print
This paper explores a method to minimize the disruption so JPEG images can be used as steganography carriers on Facebook. ...
The compression process generally disrupts attempts to use Facebook for image steganography. ...
ACKNOWLEDGMENT Krzysztof Szczypiorski was supported by the European Union in the framework of European Social Fund through the Warsaw University of Technology Development Programme. ...
arXiv:1506.02071v1
fatcat:azsbmkxdgvdfveobfivj7yziaa
Resisting Blind Steganalysis in Real Time Covert Communication
2015
International Journal of Computer Applications
In this work, we review recent developments in the field of steganography keeping real time covert communication applications in mind. ...
This whole process repeats for all the blocks and at the output of Stego_Top we finally receive compensated Stego image pixels. ...
Stego_Pxl: the final output JPEG Stego image which contains the hidden message bit stream is flushed out through this pins pixel by pixel. ...
doi:10.5120/21259-4125
fatcat:vxd4du7waff4faloraove446hu
Secure android covert channel with robust survivability to service provider restrictions
2017
International Journal of Security and Networks (IJSN)
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones. ...
However, the potential for use of smartphones -communicating over cellular service provider networks -has yet to be fully explored. ...
All images of size ≥ 1 MB were compressed (and converted to JPEG) by the native MMS
application. ...
doi:10.1504/ijsn.2017.081061
fatcat:6gdfpoqmora7tjedbbbfbgyrb4
Secure android covert channel with robust survivability to service provider restrictions
2017
International Journal of Security and Networks (IJSN)
In this paper, we propose Android-Stego -a covert communication framework for Android smartphones. ...
However, the potential for use of smartphones -communicating over cellular service provider networks -has yet to be fully explored. ...
All images of size ≥ 1 MB were compressed (and converted to JPEG) by the native MMS
application. ...
doi:10.1504/ijsn.2017.10001806
fatcat:eyxcajq24vdcxiuf4omu2sfham
Guest Editorial: Multimedia Information Security and Its Applications in Cloud Computing
2018
Multimedia tools and applications
Multimedia applications are omnipresent in our daily lives, however, a lot of relevant security issues have emerged as well, such as covert communication using multimedia files, copy-move forgery in digital ...
To address these issues, many multimedia information security techniques were proposed by utilizing the methods in areas like machine learning, signal and image processing, and communications. ...
But, the extraction of hidden messages, i.e., extraction attack, is also an important task for obtaining the evidence of covert communication. ...
doi:10.1007/s11042-018-5831-x
fatcat:x3tdme6i7vhrbbfrxgpbl44f4a
Channel models for high-capacity information hiding in images
2003
Mathematics of Data/Image Coding, Compression, and Encryption V, with Applications
We consider the scenario of blind information hiding in images as a communications channel, where the channel noise is caused by the embedding and blind extraction method as well as by any lossy compression ...
method utilized to store and transmit the image. ...
Before decoding, however, we pass the stego-image through a JPEG compression/decompression cycle for quality settings 0-12 (in Adobe Photoshop's TIFF JPEG encoding). ...
doi:10.1117/12.451259
fatcat:2ipzpdeq7vfbdkkokmkq52rkqa
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss
2015
Proceedings of the 8th International Conference on Mobile Multimedia Communications
Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. ...
Today, smartphones which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. ...
All images of size ≥ 1MB were compressed
(and converted to JPEG) by the native MMS application.
Smaller images remained intact. ...
doi:10.4108/icst.mobimedia.2015.259071
dblp:journals/amsys/Srinivasan0S15
fatcat:7ekdwtjmpbcplpklicwhgxp3gi
Secure Steganography in Multimedia Content
2009
EURASIP Journal on Information Security
JPEG compression format for images became the one that attracts steganographers the most. ...
Steganography, known as the art of covert communication, entered digital world about ten years ago. ...
doi:10.1155/2009/257131
fatcat:3gbykox5njbe7a7kh7m7lxaaku
Secure Steganography in Multimedia Content
2009
EURASIP Journal on Information Security
JPEG compression format for images became the one that attracts steganographers the most. ...
Steganography, known as the art of covert communication, entered digital world about ten years ago. ...
doi:10.1186/1687-417x-2009-257131
fatcat:hn2wfemyazc7bp52tkj25wyswm
Robust and brittle secured video for IOT
2018
International Journal of Engineering & Technology
imaging in the Iot and for the high quality compression files and secured transformation of image and video captured in the digital camera. ...
This process produces high quality JPEG, and high PSNR ratio. The scrambling algorithm is used in the encryption process. It is used for providing secured image. ...
The process in which JPEG achieves higher compression ratio with smaller size. ...
doi:10.14419/ijet.v7i2.20.11762
fatcat:5vbfdxlxyffjhiykouhoq6kbna
« Previous
Showing results 1 — 15 out of 563 results