|
|
|
Habiba Sultana, A. H. M. Kamal, Gahangir Hossain and Muhammad Ashad Kabir
In digital image processing and steganography, images are often described using edges and local binary pattern (LBP) codes. By combining these two properties, a novel hybrid image steganography method of secret embedding is proposed in this paper. This m...
ver más
|
|
|
|
|
|
|
Saurabh Agarwal and Ki-Hyun Jung
Digital images are very popular and commonly used for hiding crucial data. In a few instances, image steganography is misused for communicating with improper data. In this paper, a robust deep neural network is proposed for the identification of content-...
ver más
|
|
|
|
|
|
|
Amine Khaldi
Pág. 143 - 149
In this work, we present a classification of steganographic methods applicable to digital images. We also propose a classification of steganographic methods according to the type of image used. We noticed there are no methods that can be applied to all i...
ver más
|
|
|
|
|
|
|
Nikolay Kalashnikov,Olexandr Kokhanov,Olexandr Iakovenko,Nataliia Kushnirenko
Pág. 37 - 42
This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coeffic...
ver más
|
|
|
|
|
|
|
Abbas Ali Hussein,Osama Qasim Jumah Al-Thahab
Pág. 43 - 55
Protecting information on various communication media is considered an essential requirement in the present information transmission technology. So, there is a continuous search around different modern techniques that may be used to protect the data from...
ver más
|
|
|
|
|
|
|
Rasber Dh. Rashid, Ladeh S. Abdulrahman, Taban F. Majeed
Pág. 1 - 12
Digital Steganography means hiding sensitive data inside a cover object in a way that is invisible to un-authorized persons. Many proposed steganography techniques in spatial domain may achieve high invisibility requirement but sacrifice the good robustn...
ver más
|
|
|
|
|
|
|
Jaewoo Jeon and Youngho Cho
Once a botnet is constructed over the network, a bot master and bots start communicating by periodically exchanging messages, which is known as botnet C&C communication, in order to send botnet commands to bots, collect critical information stored in...
ver más
|
|
|
|