Sciweavers

28 search results - page 4 / 6
» F5-A Steganographic Algorithm
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 3 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
72
Voted
MEDIAFORENSICS
2010
14 years 11 months ago
Modern steganalysis can detect YASS
YASS is a steganographic algorithm for digital images that hides messages robustly in a key-dependent transform domain so that the stego image can be subsequently compressed and d...
Jan Kodovský, Tomás Pevný, Je...
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 6 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
68
Voted
CGF
2008
100views more  CGF 2008»
14 years 9 months ago
Distortion-Free Steganography for Polygonal Meshes
We present a technique for steganography in polygonal meshes. Our method hides a message in the indexed representation of a mesh by permuting the order in which faces and vertices...
Alexander Bogomjakov, Craig Gotsman, Martin Isenbu...
81
Voted
TIFS
2010
128views more  TIFS 2010»
14 years 7 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....