A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Digital invisible ink and its applications in steganography
2006
Proceeding of the 8th workshop on Multimedia and security - MM&Sec '06
To facilitate such behavior, models and implementations based on both spreadspectrum and quantization-based watermarking approaches are investigated. ...
A novel information-hiding methodology denoted as digital invisible ink is introduced. ...
Models based on important blind-detection data-hiding schemes, including spread-spectrum approaches and quantization-based techniques, are also illustrated. ...
doi:10.1145/1161366.1161372
dblp:conf/mmsec/HuangCW06
fatcat:nju6q2cwijbgdjntqdb2ln7z5e
Overview of Digital Steganography Methods and Its Applications
2013
International Journal of Advanced Science and Technology
Even though the term Steganography has been known for thousands of years, its digital form came about only lately and research was make stronger after the depressing event on 11 th Sep 2001(Twin towers ...
This paper completes with some recommendations and advantages of Steganography techniques and current research scopes. ...
two approaches are used in this technique: the direct sequence spread spectrum (DSSS) and frequency hopping spread spectrum (FHSS). ...
doi:10.14257/ijast.2013.60.05
fatcat:gkykkxfae5hozd4cnykoilma44
A Survey on Audio Steganography Approaches
2014
International Journal of Computer Applications
In this paper we will survey the overall principles of hiding secret data in audio file using audio data hiding techniques, and deliver an overview of present techniques and functions and also discuss ...
Today's internet community the secure data transfer is bounded due to its attack on data communication. Security of data can be achieved by implementing steganography techniques. ...
Other historical tricks include tiny pin punctures on selected characters, invisible inks, pencil marks on type written characters and so on. Steganography is dissimilar from cryptography. ...
doi:10.5120/16660-6640
fatcat:vp7lmry2kvcrpfnl4hwrghrgla
Spread spectrum image steganography
1999
IEEE Transactions on Image Processing
Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. ...
In this paper, we present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). ...
ACKNOWLEDGMENT The authors would like to take this opportunity to thank the anonymous reviewers for their efforts and insightful suggestions. ...
doi:10.1109/83.777088
pmid:18267522
fatcat:jzwxob5nbrf4lpbojewv2a6wpq
Overview: Main Fundamentals for Steganography
[article]
2010
arXiv
pre-print
The rapid development of multimedia and internet allows for wide distribution of digital media data. ...
It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. ...
Since spread signals tend to be difficult to remove, embedding methods based on SS should provide a considerable level of robustness .In information hiding, two special variants of spread spectrum techniques ...
arXiv:1003.4086v1
fatcat:spalfy5lufcqli5wb2w5n3ghvm
State-of-the-art Review on Steganographic Techniques
2015
International Journal of Signal Processing, Image Processing and Pattern Recognition
Data hiding can be achieved be using Digital Steganography. Digital Steganography is art of hiding secret messages behind the innocent looking digital media. ...
There are number of security attacks related to information security and number of techniques has been implemented to prevent these attacks. Data hiding is related field to information security. ...
Spread Spectrum Steganography Spread spectrum is very famous technique in digital and wireless communication. ...
doi:10.14257/ijsip.2015.8.7.15
fatcat:3qt4qjuqivhopnnh5biwpgktiy
Steganography Schemes for Data & Information Protection
2021
Advances in Multidisciplinary & Scientific Research Journal Publication
In ensuring the security of data and information researchers have come up with different schemes and techniques that can provide protection for data and information during transmission. ...
In this digital world of data transmission, information is at the heart of computers, transactions and international economic dealings. ...
such as coding techniques for text, usage of invisible inks, and incorporating hidden messages in music. ...
doi:10.22624/aims/abmic2021p7
fatcat:3qol7ysl2vdmbmy2ws6wetoauu
Codebook Code Division Multiple Access Image Steganography
2005
Radioengineering
Our method is based on CDMA SSIS technique. ...
In this paper, a new modification of spread spectrum imagesteganography (SSIS) is presented. ...
Acknowledgements The work presented in this paper was supported by the Grant of the Ministry of Education and the Academy of Science of the Slovak Republic VEGA under Grant No. 1/1057/04. ...
doaj:b09d59786cf74e6698ca3e89631a5517
fatcat:purp3ajwabhcxn37ctcdpdh2me
A Study of Steganography Based Data Hiding Techniques
2017
International Journal of Emerging Research in Management and Technology
This paper presents a review on steganography techniques and their uses and attacks on these. The steganography is commonly known as covert writing and mainly used in hidden communication. ...
Many information system security techniques are available. They are classified into three classes as cryptography, steganography and watermarking. ...
Other techniques of steganography include spread spectrum steganography, statistical steganography, distortion, and cover generation steganography.
VI. ...
doi:10.23956/ijermt/sv6n4/134
fatcat:icrro5cf6zcmfcfpxbp243ztxe
Hiding Image in Audio using DWT and LSB
2013
International Journal of Computer Applications
Later on the spread of internet, information can be sent easily and quickly .Still, at the same time the sent data was easily intercepted and uncovered by hackers. ...
The emphasize will be on the proposed scheme of image hiding in audio and its comparison with simple Least Significant Bit insertion method for data hiding in audio. ...
Literally meaning "covered writing", it includes a wide range of secret communication methods like invisible inks, microdots, character arrangement, digital signatures, covert channels, spread spectrum ...
doi:10.5120/13983-1988
fatcat:yna77jvocfclpbmvhhfnoo55bi
Effective Security Mechanism for Audio Steganography
2017
IARJSET
A hybrid method for audio steganography (using modified Direct Sequence Spread spectrum) and cryptography (using advanced random permutation with multiple key applications) has been proposed in this paper ...
. Get spreading size by multiplying spreading factor i.e. 2 with total number of elements of binary watermark matrix and generate a random binary key sequence according to spreading size, so as to provide ...
Spread Spectrum Technique These techniques are derived from the concepts used in spread spectrum communication [17] . ...
doi:10.17148/iarjset.2017.4717
fatcat:rfmznrvfbjgnloz5hdi54xvwia
Data Sneaking: A White Paper in Steganography
2020
Journal of the ACS Advances in Computer Science
These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. ...
Digital technology gives us new ways to apply steganographic techniques, including one of the most trickery that of hiding information in multimedia likes image, audio and video. ...
Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China. ...
doi:10.21608/asc.2020.176270
fatcat:prx2bwu7wnddzgiwecdas4rkra
Information Hiding Techniques: A Tutorial Review
[article]
2008
arXiv
pre-print
Text, image and audio based information hiding techniques are discussed. This paper also provides a basic introduction to digital watermarking. ...
The purpose of this tutorial is to present an overview of various information hiding techniques. A brief history of steganography is provided along with techniques that were used to hide information. ...
The two different spread-spectrum techniques these tools employ are called direct-sequence and frequency hopping. ...
arXiv:0802.3746v1
fatcat:hbrfhubuajeihgny3g6pfehwqy
Hide and Seek: A White Paper in Steganography
2013
Journal of the ACS Advances in Computer Science
These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. ...
Digital technology gives us new ways to apply steganographic techniques, including one of the most trickery that of hiding information in multimedia likes image, audio and video. ...
Shilong Ma in Beijing University of Aeronautics and Astronautics (BUAA), China. ...
doi:10.21608/asc.2013.158158
fatcat:qciwsghsmfajzkz3kqaubhdspy
Image Steganography: Critical Findings through Some Novel Techniques
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Word 'Steganography' is originated from Greekand has been used in several forms for 2500 years which is a art of hiding confidential data in any digital manner in such a way that no one can concealed it ...
This survey paper put the light on the basic of image steganography along with its different techniques and sub-techniques. Cover selection with recent trend ROI (region Of Interest) is highlighted. ...
by German people and Invisible ink were used for hiding the data in invisible manner [17] . ...
doi:10.35940/ijitee.e2634.039520
fatcat:zuqertcqsbhevgd6dqotkuumme
« Previous
Showing results 1 — 15 out of 91 results