A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Time-Based Dynamic Operation Model for Webpage Steganography Methods
2020
Electronics
However, if a stego webpage is used in a static way such that the stego webpage does not change and is constantly exposed to web clients until the sender removes it, such a static operation approach will ...
steganography methods. ...
Thus, if a stego webpage is operated simply in a static manner such that such a static operation feature will make a webpage steganography method very inefficient and inferior in terms of hiding capacity ...
doi:10.3390/electronics9122113
fatcat:egby3l6rczb77b74u7lrkhi4ie
Digital steganography: hiding data within data
2001
IEEE Internet Computing
. large uncompressed image of television static, as illustrated in Figure 2 . ...
My chances of success are fairly high, however, given that most individuals never consider the fact that there is more than one way to parse something that looks like written English in a magazine. ...
doi:10.1109/4236.935180
fatcat:lj6mls2c2fbm3ou7um2gzb2xj4
High Capacity Data Embedding Method in Image Steganography using Genetic Algorithm
2015
International Journal of Computer Applications
It is known that cryptographic techniques help augment the image steganography process to a great degree. ...
Genetic algorithms (GA) are used in image steganography due to 'adaptive heuristic search' based on evolutionary biology. ...
As folks mate and produce posterity, room must be made for the fresh introductions since the populace is kept at a static size. ...
doi:10.5120/21610-4770
fatcat:oozo6fqgwfeufdzbg3tvanr3xe
Developing a Video Steganography Toolkit
[article]
2014
arXiv
pre-print
Although techniques for separate image and audio steganography are widely known, relatively little has been described concerning the hiding of information within video streams ("video steganography"). ...
In this paper we review the current state of the art in this field, and describe the key issues we have encountered in developing a practical video steganography system. ...
While encryption and steganography serve fundamentally different purposes, encryption can nonetheless be used with steganography to obfuscate embedded ASCII messages: figure 4(b) shows a significant ...
arXiv:1409.4883v1
fatcat:xgagbm52dfhwfmi5nfrcrmk6au
Secure Information Hiding Based on Random Similar Bit Mapping
2020
International Journal of Machine Learning and Computing
A hybrid steganography and cryptography method was introduced to increase the security of data transmission. ...
The goal of cryptography is to maintain the secrecy of information while steganography aims to hide the information. ...
Static Parsing Steganography (SPS) [10] is based on parsing the image instead of modifying it. ...
doi:10.18178/ijmlc.2020.10.4.974
fatcat:uo4vrb4tobgarkrbgbenhyowza
Information Hiding in SOAP Messages: A Steganographic Method for Web Services
2011
International Journal for Information Security Research
There are still very limited methods of steganography to be used with communication protocols, which represent unconventional but promising steganography mediums. ...
Then, we propose a novel steganography method to be used for SOAP messages within Web services environments. ...
Usually, using static keys provides the crackers more chance to break the system than using dynamic keys [14] . ...
doi:10.20533/ijisr.2042.4639.2011.0008
fatcat:eeevhjl73ffubgq75id52ifd6e
A Comparative Analysis of Arabic Text Steganography
2021
Applied Sciences
Language's characteristics are utilized in text steganography. ...
Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA. ...
Example of Random and Statical Generation (Data from [36] ). ...
doi:10.3390/app11156851
fatcat:rnczinyr5jgixdxxac4onjvyle
Prime-based mimic functions for the implementation of covert channels
2010
2010 IEEE International Conference on Wireless Communications, Networking and Information Security
This type of mapping algorithm, can be implemented statically by tables and / or dynamically. It can be expanded to include any size of input integer. ...
INTRODUCTION AND LITERATURE REVIEW This paper concentrates on lexical steganography using mimic functions. ...
doi:10.1109/wcins.2010.5541837
dblp:conf/wcnis/ConnellTG10
fatcat:dumw42jfq5dzhp3wzamqphx3oy
Golang Library/CLI Tool to Provide Data Analysis and Conversion Utilities
2021
International Journal for Research in Applied Science and Engineering Technology
networks or low-level system software, or when doing regular administration of any development or production environments, or while learning about security or networks people often need tools to convert, parse ...
Steganography is the technique of hiding secret data inside an ordinary file or message. ...
Static and dynamic typing is supported by Go and is designed to be safe, efficient and comprehensible. ...
doi:10.22214/ijraset.2021.35329
fatcat:clftcpmryjbrjnxdz4uijdqgti
A Universal Malicious Documents Static Detection Framework Based on Feature Generalization
2021
Applied Sciences
A universal static detection framework for malicious documents based on feature generalization is then proposed. ...
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents ...
The document parsing module uses the corresponding static document parsing tool to parse the document into document objects according to the document type, and records error information and error locations ...
doi:10.3390/app112412134
fatcat:hzpq4dhjdrfb7joxiaexqpokva
Hydan: Hiding Information in Program Binaries
[chapter]
2004
Lecture Notes in Computer Science
Thanks to El Rezident for the PE/COFF parsing code. We also thank Josha Bronson and Vivek Hari for their help in obtaining the FreeBSD and WindowsXP instruction statistics. ...
Examples include: • Static data watermarks: • const char c[] = "Copyright (c).. ...
Executable Code Steganography Despite the relative lack of work on code steganography, there are a few general techniques that have been developed, and at least four patents issued [5] [6] [7] [8] . ...
doi:10.1007/978-3-540-30191-2_15
fatcat:plvwxx5hvzdtxcbyeev7sswwf4
Analyzing the Performance of Block-Splitting in LLVM Fingerprinting
2022
International Conference on Cyber Warfare and Security (ICIW)
This paper expands and builds upon previous work reported at the 2021 ICCWS concerning Executable Steganography and software intellectual property protection via fingerprinting. ...
Both a static fingerprinting method, where the serial number or data is embedded and visible by inspection, and a dynamic method, where the code must be executed, were explored. ...
The LLVM parser would then create a parse tree in memory and search the parse tree for functions. ...
doi:10.34190/iccws.17.1.39
fatcat:7f5pp2owmnbi3cl2pr4nlsw6bm
MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images
2020
IEEE Access
MalJPEG statically extracts 10 simple yet discriminative features from the JPEG file structure and leverages them with a machine learning classifier, in order to discriminate between benign and malicious ...
In addition, the features are relatively easy to extract statically (without actually presenting the image) when parsing the JPEG image file. ...
The features are simple and relatively easy to extract statically (without actually viewing the image) when parsing the JPEG image file. We evaluate MalJPEG in four experiments. ...
doi:10.1109/access.2020.2969022
fatcat:kumhng5rnfceznxpenz7cohrh4
A Study of Malcode-Bearing Documents
[chapter]
2007
Lecture Notes in Computer Science
We investigate the possibility of detecting embedded malcode in Word documents using two techniques: static content analysis using statistical models of typical document content, and run-time dynamic tests ...
Method 1: Train one single model without parsing. Method 2: Train multiple models for the parsed sections. ...
Thus, the training documents are parsed and the models are created using the parsed sections, one model for each section. ...
doi:10.1007/978-3-540-73614-1_14
fatcat:r4xyai2zyvcmpezufyi4chujye
Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs
2016
Procedia Computer Science
Side-channel communication is actually a form of steganography referred to as "Network Steganography". ...
The Wireshark capture files were parsed using TShark in order to obtain the relevant frames, and then run through MATLAB & Sinalgo. ...
doi:10.1016/j.procs.2016.04.206
fatcat:4cxw336gmngvvfbiaot6fgsgca
« Previous
Showing results 1 — 15 out of 160 results