160 Hits in 2.1 sec

A Time-Based Dynamic Operation Model for Webpage Steganography Methods

Simun Yuk, Youngho Cho
2020 Electronics  
However, if a stego webpage is used in a static way such that the stego webpage does not change and is constantly exposed to web clients until the sender removes it, such a static operation approach will  ...  steganography methods.  ...  Thus, if a stego webpage is operated simply in a static manner such that such a static operation feature will make a webpage steganography method very inefficient and inferior in terms of hiding capacity  ... 
doi:10.3390/electronics9122113 fatcat:egby3l6rczb77b74u7lrkhi4ie

Digital steganography: hiding data within data

D. Artz
2001 IEEE Internet Computing  
. large uncompressed image of television static, as illustrated in Figure 2 .  ...  My chances of success are fairly high, however, given that most individuals never consider the fact that there is more than one way to parse something that looks like written English in a magazine.  ... 
doi:10.1109/4236.935180 fatcat:lj6mls2c2fbm3ou7um2gzb2xj4

High Capacity Data Embedding Method in Image Steganography using Genetic Algorithm

Usha B.A, N.K Srinath, Pulkita Pulkita, Sarthak Sarthak
2015 International Journal of Computer Applications  
It is known that cryptographic techniques help augment the image steganography process to a great degree.  ...  Genetic algorithms (GA) are used in image steganography due to 'adaptive heuristic search' based on evolutionary biology.  ...  As folks mate and produce posterity, room must be made for the fresh introductions since the populace is kept at a static size.  ... 
doi:10.5120/21610-4770 fatcat:oozo6fqgwfeufdzbg3tvanr3xe

Developing a Video Steganography Toolkit [article]

James Ridgway, Mike Stannett
2014 arXiv   pre-print
Although techniques for separate image and audio steganography are widely known, relatively little has been described concerning the hiding of information within video streams ("video steganography").  ...  In this paper we review the current state of the art in this field, and describe the key issues we have encountered in developing a practical video steganography system.  ...  While encryption and steganography serve fundamentally different purposes, encryption can nonetheless be used with steganography to obfuscate embedded ASCII messages: figure 4(b) shows a significant  ... 
arXiv:1409.4883v1 fatcat:xgagbm52dfhwfmi5nfrcrmk6au

Secure Information Hiding Based on Random Similar Bit Mapping

Abdul Alif Zakaria, Department of Cryptography Development, CyberSecurity Malaysia, 63000 Selangor, Malaysia, Norli Anida Abdullah
2020 International Journal of Machine Learning and Computing  
A hybrid steganography and cryptography method was introduced to increase the security of data transmission.  ...  The goal of cryptography is to maintain the secrecy of information while steganography aims to hide the information.  ...  Static Parsing Steganography (SPS) [10] is based on parsing the image instead of modifying it.  ... 
doi:10.18178/ijmlc.2020.10.4.974 fatcat:uo4vrb4tobgarkrbgbenhyowza

Information Hiding in SOAP Messages: A Steganographic Method for Web Services

Bachar Alrouh, Adel Almohammad, Gheorghita Ghinea
2011 International Journal for Information Security Research  
There are still very limited methods of steganography to be used with communication protocols, which represent unconventional but promising steganography mediums.  ...  Then, we propose a novel steganography method to be used for SOAP messages within Web services environments.  ...  Usually, using static keys provides the crackers more chance to break the system than using dynamic keys [14] .  ... 
doi:10.20533/ijisr.2042.4639.2011.0008 fatcat:eeevhjl73ffubgq75id52ifd6e

A Comparative Analysis of Arabic Text Steganography

Reema Thabit, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Nuur Alifah Roslan, Roshidi Din
2021 Applied Sciences  
Language's characteristics are utilized in text steganography.  ...  Steganography protects the secret information by concealing it in a transferred object such as video, audio, image, text, network, or DNA.  ...  Example of Random and Statical Generation (Data from [36] ).  ... 
doi:10.3390/app11156851 fatcat:rnczinyr5jgixdxxac4onjvyle

Prime-based mimic functions for the implementation of covert channels

Wesley Connell, Dan Tamir, Mina Guirguis
2010 2010 IEEE International Conference on Wireless Communications, Networking and Information Security  
This type of mapping algorithm, can be implemented statically by tables and / or dynamically. It can be expanded to include any size of input integer.  ...  INTRODUCTION AND LITERATURE REVIEW This paper concentrates on lexical steganography using mimic functions.  ... 
doi:10.1109/wcins.2010.5541837 dblp:conf/wcnis/ConnellTG10 fatcat:dumw42jfq5dzhp3wzamqphx3oy

Golang Library/CLI Tool to Provide Data Analysis and Conversion Utilities

Tyagraj Desigar
2021 International Journal for Research in Applied Science and Engineering Technology  
networks or low-level system software, or when doing regular administration of any development or production environments, or while learning about security or networks people often need tools to convert, parse  ...  Steganography is the technique of hiding secret data inside an ordinary file or message.  ...  Static and dynamic typing is supported by Go and is designed to be safe, efficient and comprehensible.  ... 
doi:10.22214/ijraset.2021.35329 fatcat:clftcpmryjbrjnxdz4uijdqgti

A Universal Malicious Documents Static Detection Framework Based on Feature Generalization

Xiaofeng Lu, Fei Wang, Cheng Jiang, Pietro Lio
2021 Applied Sciences  
A universal static detection framework for malicious documents based on feature generalization is then proposed.  ...  In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents  ...  The document parsing module uses the corresponding static document parsing tool to parse the document into document objects according to the document type, and records error information and error locations  ... 
doi:10.3390/app112412134 fatcat:hzpq4dhjdrfb7joxiaexqpokva

Hydan: Hiding Information in Program Binaries [chapter]

Rakan El-Khalil, Angelos D. Keromytis
2004 Lecture Notes in Computer Science  
Thanks to El Rezident for the PE/COFF parsing code. We also thank Josha Bronson and Vivek Hari for their help in obtaining the FreeBSD and WindowsXP instruction statistics.  ...  Examples include: • Static data watermarks: • const char c[] = "Copyright (c)..  ...  Executable Code Steganography Despite the relative lack of work on code steganography, there are a few general techniques that have been developed, and at least four patents issued [5] [6] [7] [8] .  ... 
doi:10.1007/978-3-540-30191-2_15 fatcat:plvwxx5hvzdtxcbyeev7sswwf4

Analyzing the Performance of Block-Splitting in LLVM Fingerprinting

William Mahoney, Philip Sigillito, Jeff Smolinski, Todd McDonald, George Grispos
2022 International Conference on Cyber Warfare and Security (ICIW)  
This paper expands and builds upon previous work reported at the 2021 ICCWS concerning Executable Steganography and software intellectual property protection via fingerprinting.  ...  Both a static fingerprinting method, where the serial number or data is embedded and visible by inspection, and a dynamic method, where the code must be executed, were explored.  ...  The LLVM parser would then create a parse tree in memory and search the parse tree for functions.  ... 
doi:10.34190/iccws.17.1.39 fatcat:7f5pp2owmnbi3cl2pr4nlsw6bm

MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images

Aviad Cohen, Nir Nissima, Yuval Elovici
2020 IEEE Access  
MalJPEG statically extracts 10 simple yet discriminative features from the JPEG file structure and leverages them with a machine learning classifier, in order to discriminate between benign and malicious  ...  In addition, the features are relatively easy to extract statically (without actually presenting the image) when parsing the JPEG image file.  ...  The features are simple and relatively easy to extract statically (without actually viewing the image) when parsing the JPEG image file. We evaluate MalJPEG in four experiments.  ... 
doi:10.1109/access.2020.2969022 fatcat:kumhng5rnfceznxpenz7cohrh4

A Study of Malcode-Bearing Documents [chapter]

Wei-Jen Li, Salvatore Stolfo, Angelos Stavrou, Elli Androulaki, Angelos D. Keromytis
2007 Lecture Notes in Computer Science  
We investigate the possibility of detecting embedded malcode in Word documents using two techniques: static content analysis using statistical models of typical document content, and run-time dynamic tests  ...  Method 1: Train one single model without parsing. Method 2: Train multiple models for the parsed sections.  ...  Thus, the training documents are parsed and the models are created using the parsed sections, one model for each section.  ... 
doi:10.1007/978-3-540-73614-1_14 fatcat:r4xyai2zyvcmpezufyi4chujye

Evaluating Hamming Distance as a Metric for the Detection of CRC-based Side-channel Communications in MANETs

Brent Moore, Miguel Vargas Martin, Ramiro Liscano
2016 Procedia Computer Science  
Side-channel communication is actually a form of steganography referred to as "Network Steganography".  ...  The Wireshark capture files were parsed using TShark in order to obtain the relevant frames, and then run through MATLAB & Sinalgo.  ... 
doi:10.1016/j.procs.2016.04.206 fatcat:4cxw336gmngvvfbiaot6fgsgca
« Previous Showing results 1 — 15 out of 160 results