Filters








774 Hits in 3.1 sec

Principles and overview of network steganography

Jozef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski
2014 IEEE Communications Magazine  
The article discusses basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network  ...  steganographic methods and techniques.  ...  Basic principles of network steganography are introduced and discussed; a concise overview and classification of network steganographic methods are presented; we conclude our work with a general remark  ... 
doi:10.1109/mcom.2014.6815916 fatcat:tq4s43ai6nfexct3tme4akz2ga

Principles and Overview of Network Steganography [article]

Jozef Lubacz, Wojciech Mazurczyk, Krzysztof Szczypiorski
2012 arXiv   pre-print
The paper presents basic principles of network steganography, which is a comparatively new research subject in the area of information hiding, followed by a concise overview and classification of network  ...  steganographic methods and techniques.  ...  An overview of network steganography techniques As this is a short paper, the following overview does not cover all of the techniques proposed in the literature.  ... 
arXiv:1207.0917v1 fatcat:ilc4g63drnbvthwnmjf7nwgfwm

Why Johnny Can't Use Stego: a Human-oriented Perspective on the Application of Steganography [article]

Steffen Wendzel
2016 arXiv   pre-print
Existing research already provided several fundamentals for defining steganography and presented a multitude of hiding methods and countermeasures for this research discipline.  ...  This paper presents a phase model that explains pre-conditions of applying steganography as well as the decision-making process and the final termination of a steganographic communication.  ...  Overview This paper is structured as follows. Section 2 presents related work. We introduce our phase model in Section 3 and discuss it in Section 4.  ... 
arXiv:1609.06664v1 fatcat:jfig3v6luffmjak3lh3v5eqqoq

A Novel Hybrid Approach for Secure Cloud Mining using Lossless Image Format

Sanjima Manocha, Sheveta Vashisht
2014 International Journal of Computer Applications  
Centralize management of software and data storage, with assurance of efficient, reliable and secure services for their users through Edge detection based approach for image steganography.  ...  of storage and infrastructure.  ...  This paper provides an overview of the necessity and utility of data mining in cloud computing with Edge detection based approach for image steganography.  ... 
doi:10.5120/17194-7389 fatcat:7i4pdkj4gzhh7kuwbiqw7fxuxq

Direct Sequence Spread Spectrum Steganographic Scheme for IEEE 802.15.4 [article]

Elzbieta Zielinska, Krzysztof Szczypiorski
2011 arXiv   pre-print
This work addresses the issues related to network steganography in IEEE 802.15.4 Wireless Personal Area Networks (WPAN).  ...  The presented approach is a compromise between minimising the probability of covert channel disclosure and providing robustness against random errors and a high steganographic data rate.  ...  The rest of this work is organised as follows. Sections II and III provide an overview of steganographic methods for IEEE 802.15.4 and a detailed description of the DSSS steganography concept.  ... 
arXiv:1107.4230v1 fatcat:sbpyoesep5fklijqd4yrhtm4ni

Towards Steganography Detection Through Network Traffic Visualisation [article]

Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski
2012 arXiv   pre-print
The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic visualisations.  ...  The method's feasibility is demonstrated in network steganography environment by presenting steg-tomography methodology and developing the dedicated visualisation tool.  ...  Detection of network steganography is still in its infancy and does not have satisfactory methods/devices.  ... 
arXiv:1208.2861v1 fatcat:3e3hitvu5vbsvhch6dfckhjioe

Improved Image Steganography Algorithm using Huffman Codes

Hamza Tariq, Heebah Saleem
2016 International Journal of Computer Applications  
Steganography promises confidentiality of data being transmitted between two parties by hiding the very existence of the data. It helps to achieve secure transmission of data over a network.  ...  This research paper provides a technical introduction of image steganography and its implementation using Least Significant Bit (LSB) technique with Huffman Coding.  ...  The theory of Huffman Coding Algorithm and its working principle is described [3] .  ... 
doi:10.5120/ijca2016911242 fatcat:3jlz5edfpjag7dq2tp24yaliqu

Comprehensive Survey of Multimedia Steganalysis: Techniques, Evaluations, and Trends in Future Research

Doaa A. Shehab, Mohmmed J. Alhaddad
2022 Symmetry  
Steganalysis techniques aim to breach steganography techniques and detect the presence of invisible messages.  ...  This survey provides the general principles of hiding secret messages using digital multimedia as well as reviewing the background of steganalysis.  ...  The authors, therefore, acknowledge with thanks DSR for technical and financial support. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym14010117 fatcat:s2oinfxtbjcdhjvdv7vqrs6jlm

An overview of image steganography

T. Morkel, Jan H. P. Eloff, Martin S. Olivier
2005 Information Security for South Africa  
This paper intends to give an overview of image steganography, its uses and techniques.  ...  Different applications have different requirements of the steganography technique used.  ...  Thus for an agent to decide on which steganographic algorithm to use, he would have to decide on the type of application he want to use the algorithm for and if he is willing to compromise on some features  ... 
dblp:conf/issa/MorkelEO05 fatcat:ulgbiwkgqjgbbd46srwoqeawbq

A Novel Approach for Improving Security by Digital Signature and Image Steganography

Sarika Sharma, V. Kapoor
2017 International Journal of Computer Applications  
Information security is becoming more and more vital with the progress in the exchange of data. Protected communication in the network is a key necessity.  ...  A digital signature is a procedure used to certify the authenticity and integrity of a message, software and digital documents.  ...  Steganography) over the network.  ... 
doi:10.5120/ijca2017915145 fatcat:botoj2w7a5fgbchqioyyixwdbe

Multilayer Detection of Network Steganography

Milosz Smolarczyk, Krzysztof Szczypiorski, Jakub Pawluk
2020 Electronics  
This paper presents a new method for steganography detection in network protocols.  ...  The main objective is to provide steganalysis capability for networks with large numbers of devices and connections. We discuss considerations for performance analysis and present results.  ...  Funding: This scientific research work was co-financed by the European Union, project name: "The system for identification and monitoring of anomalies and risks in ICT networks".  ... 
doi:10.3390/electronics9122128 fatcat:bbqlbegtfjfo5icowgupetlnaq

An approach to video steganography using novel substitution technique
IJARCCE - Computer and Communication Engineering

AKASH AGRAWAL, D.A. BORIKAR
2014 IJARCCE  
the lack of security and embedding efficiency.So to overcome such issue a secure video steganography technique is propose in this paper which is based on the principle of LSB substitution which cannot  ...  Therefore to keep the information secure many algorithms of steganography and information hiding have been proposed.  ...  Authors are thankful to the faculty members of Computer Science and Engineering Department for their support and cooperation during this work.  ... 
doi:10.17148/ijarcce.2014.31235 fatcat:ibdmoodw2jan5ncxkzoyus62pu

A Novel Security Scheme for Secret Data using Cryptography and Steganography

Phad Vitthal S., Bhosale Rajkumar S., Panhalkar Archana R.
2012 International Journal of Computer Network and Information Security  
With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years.  ...  Cryptography and Steganography are the two major techniques for secret communication.  ...  AES is based on a design principle known as a Substitution permutation network. AES operates on a 4×4 matrix of bytes, termed the state .  ... 
doi:10.5815/ijcnis.2012.02.06 fatcat:c4rzmxq7zfad3lfvfx3jeleuj4

Book Review: System Forensics, Investigation, and Response

Nate Keith
2012 Journal of Digital Forensics, Security and Law  
The authors present a basic overview of networks, protocols, and types of network attacks. Using log files in investigations and as evidence is addressed.  ...  Then follows a lengthy discussion of steganography: what it is, how it is used, and the tools and techniques to generate, detect, and decrypt steganography content.  ... 
doi:10.15394/jdfsl.2012.1123 fatcat:dfngyefobzdnjl46oumhgibxr4

Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss

Avinash Srinivasan, Jie Wu, Justin Shi
2015 Proceedings of the 8th International Conference on Mobile Multimedia Communications  
Today, smartphones which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel.  ...  However, steganography on smartphones over cellular carrier networks is yet to be fully explored.  ...  The authors would like to thank Chris Brahms, Stephan Reimers, and Thomas Valadez for their contributions towards the implementation and validation of Android-Stego, as well as the draft of this paper.  ... 
doi:10.4108/icst.mobimedia.2015.259071 dblp:journals/amsys/Srinivasan0S15 fatcat:7ekdwtjmpbcplpklicwhgxp3gi
« Previous Showing results 1 — 15 out of 774 results