Search Results

1 - 10 of 27 items :

  • "steganography" x
Clear All
Unified Evaluation System for Audio Steganography Methods

://www.scholarpedia.org/article/Signal-to-noise_ratio I. J. Cox, M. L. Miller, J. A. Bloom, Digital Watermarking and Steganography. Morgan Kaufmann Publishers, 2008. P. Dutta, D. Bhattacharyya, T. Kim, Data Hiding in Audio Signal: A Review , "International Journal of Database Theory and Application", Vol. 2, 2009, pp. 1-8. Free lossless audio codec. [Online]. Available: http://flac.sourceforge.net The MPEG Home Page. [Online]. Available: http://mpeg.chiariglione.org D. Yan, R. Wang, Huffman table swapping

Open access
Comparison of Video Steganography Methods for Watermark Embedding

R eferences [1] E. Zielinska, W. Mazurczyk and K. Szczypiorski, “Trends in Steganography,” Communications of the ACM , no. 03, issue 57, 2014, pp. 86–95. http://dx.doi.org/10.1145/2566590.2566610 [2] I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography , 2nd Ed., Burlington: Morgan Kaufmann, 2007. [3] G. Konahovich and A. Puzirenko, Digital Steganography, Theory and Practice – Компьютерная стеганография, теория и практика. Kiev: MK-Press, 2006. (in Russian) [4] A. K. Al-Frajat, H. A. Jalab, Z

Open access
Using Concatenated Steganography for Visual Analysis in GIS SOA

Analysis and Spatial Decision Support. Proceedings of the IADIS International Conferences. Computer Graphics, Visualization, Computer Vision and Image Processing 2010. July 27-29, 2010. Germany: IADIS Press, pp. 184 - 192. [4] Yershov A. Concatenated Steganography as an Alternative Solution for Data Streams Synchronization. Local Proceedings of 13th East- European Conference (ADBIS 2009). Associated Workshops and Doctoral Consortium. September 7-10, 2009. Latvia: Riga, pp. 444-452. [5] Yershov A., Rusakov P. The Comparative Analysis of

Open access
Image-based jpeg steganography

References [1] ARNOLD, M.-SCHMUCKER, M.-WOLTHUSEN, S.: Techniques and Applications of Digital Watermarking and Content Protection . Artech House, London, 2003. [2] CHANDRAMOULI, R.-KHARAZZI, M.-MEMON, N.: Image steganography and steganalysis: concepts and practice , in: Internat. Workshop on Digital Watermarking- -IWDW ’03 (T. Kalker et al., eds.), Lecture Notes in Computer Science, Vol. 2939, Springer-Verlag, Berlin, 2004, pp. 35-49. [3] FRIDRICH, J.-GOLJAN, M.-DU, R.: Reliable detection of LSB

Open access
An Enhanced LSB-Image Steganography Using the Hybrid Canny-Sobel Edge Detection

), Yogyakarta, 2017. 6. Setiadi, D. R. I. M., H. A. Santoso, E. H. Rachmawanto, C. A. Sari. An Improved Message Capacity and Security Using Divide and Modulus Function in Spatial Domain Steganography. – In: International Conference on Information and Communications Technology (ICOIACT’18), Yogyakarta, 2018. 7. Setyono, A., D. R. I. M. Setiadi, Muljono. StegoCrypt Method Using Wavelet Transform and One-Time Pad for Secret Image Delivery. – In: International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE’17), Semarang, 2017

Open access
Digital Image Steganography Using Bit Flipping

References 1. Johnson, N. F., S. Jajodia. Exploring Steganography: Seeing the Unseen. – IEEE Computer, Vol. 31 , 1998, No 2, pp. 26-34. 2. Kumar, R., S. Chand. A Reversible Data Hiding Scheme Using Bit Flipping Strategy. – Journal of Discrete Mathematical Sciences and Cryptography, Vol. 19 , 2016, No 2, pp. 331-345. 3. Pradhan, A., A. K. Sahu, G. Swain, K. R. Sekhar. Performance Evaluation Parameters of Image Steganography Techniques. – In: Proc. of International Conference on Research Advances in Integrated Navigation Systems, 2016. 4

Open access
VoIP Steganography Methods, a Survey

References 1. Mazurczyk, W., J. Lubacz. LACK-a VoIP Steganographic Method – Telecommunication Systems, Vol. 45 , 2010, No 2-3, pp. 153-163. 2. Hui, T., H. Jiang, K. Zhou, D. Feng. Adaptive Partial-Matching Steganography for Voice over IP Using Triple M Sequences. – Computer Communications, Vol. 34 , 2011, No 18, pp. 2236-2247. 3. Calpouzos, G., C. Varol. GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec. – Computer Science and Information Technology, Vol. 1 , 2013, No 2, pp. 153-158. 4. Mazurczyk, W. VoIP

Open access
Kutter Steganographical Method's Improvement and Concept of Universal Stegoconstructor

://www.crime-research.org/library/Steganos.htm Грибунин В.Г. Цифровая стеганография. - Россия: СОЛОН-Пресс. - 2002. - P.272. Katzenbeisser S., Petitcolas F. A. P. Information Hiding Techniques for Steganography and Digital Watermarking. - Boston: Artech House. - 2000. - P.237. Шестаков В.Н. Защита информации. Учебное пособие. - Красноярск: Красноярский Государственный Технический Университет. - 2002. - P. 75. Sivakumar S. Information Hiding: Steganography // Presentation for Digital Image Processing. - 2004. - P.39

Open access
Development of Requirements Specification for Steganographic Systems

R eferences [1] I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography , 2nd ed. Burlington: Morgan Kaufmann, 2008, 624 p. [2] C. Everett, “Should encryption software be banned?” Network Security , vol. 2016, iss. 8, pp. 14–17, Aug. 2016. https://doi.org/10.1016/S1353-4858(16)30078-2 [3] P. Mozur, The New York Times. New Rules in Chine Upset Western Tech Companies . 2015. [Online]. Available: http://www.nytimes.com/2015/01/29/technology

Open access
General Principles of Integrity Checking of Digital Images and Application for Steganalysis

Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, June 1995. Neos Marmaras, Greece: IEEE CAS and ASSP Societies, pp. 123-132. 10. Kutter, M., Jordan, F. and Bossen, F. (1998) Digital signature of color images using amplitude modulation. Journal of Electronic Imaging, 7(2), 326-332. 11. Xia, Z., Yang, L., Sun, X., Liang, W., Sun, D. and Ruan, Z. (2011) A Learning-Based Steganalytic Method against LSB Matching Steganography. Radioengineering, 20(1), 102-109. 12. Li, B., He, J., Huang, J. and Shi, Y

Open access