Sciweavers

1744 search results - page 2 / 349
» The Steganographic File System
Sort
View
86
Voted
CSREASAM
2006
14 years 11 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
HOTOS
2007
IEEE
15 years 1 months ago
A Web Based Covert File System
We present the idea of a web based covert file system, CovertFS. This file system allows a user to store files covertly on media sharing websites while guaranteeing confidentialit...
Arati Baliga, Joe Kilian, Liviu Iftode
87
Voted
IH
2001
Springer
15 years 1 months ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld
89
Voted
IH
1999
Springer
15 years 1 months ago
Attacks on Steganographic Systems
The majority of steganographic utilities for the camouflage of confidential communication suffers from fundamental weaknesses. On the way to more secure steganographic algorithm...
Andreas Westfeld, Andreas Pfitzmann
84
Voted
IH
1998
Springer
15 years 1 months ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf