Sciweavers

2474 search results - page 4 / 495
» Attacks on Steganographic Systems
Sort
View
ICASSP
2010
IEEE
14 years 7 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
68
Voted
MMSEC
2005
ACM
131views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Capacity of steganographic channels
—This work investigates a central problem in steganography, that is: How much data can safely be hidden without being detected? To answer this question a formal definition of st...
Jeremiah J. Harmsen, William A. Pearlman
NDSS
2002
IEEE
15 years 2 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
IH
2007
Springer
15 years 3 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
86
Voted
CSREASAM
2006
14 years 11 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota