Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

[PDF][PDF] A secure image steganography using LSB and double XOR operations

A Ahmed, A Ahmed - … Journal of Computer Science and Network …, 2020 - researchgate.net
Summary Least Significant Bit (LSB) is a common and popular technique for steganographic
images, especially when the spatial domain of an image is considered. Because of its high …

Audio steganography using lifting wavelet transform and dynamic key

M Anwar, M Sarosa, E Rohadi - 2019 international conference …, 2019 - ieeexplore.ieee.org
Steganography is an art and techniques to hide data within data can be applied to images,
video files or audio files. Along with the Internet growth, threats to confidential information …

Exploring the challenges of MP3 audio steganography

MS Atoum, S Ibrahimn, G Sulong, A Zeki… - 2013 International …, 2013 - ieeexplore.ieee.org
This paper presents the issues and challenges faced for steganographic techniques that
uses MP3 (Moving Picture Experts Group-1" MPEG-1" Audio Layer 3) files as the cover or …

A new approach for secure data transfer in audio signals using DWT

B Geethavani, EV Prasad… - 2013 15th International …, 2013 - ieeexplore.ieee.org
Steganography is an information hiding technique where secret message is embedded into
unsuspicious cover signal. In this paper, a novel approach of integrating the features of …

A comparative study of combination with different LSB techniques in mp3 steganography

MS Atoum - Information Science and Applications, 2015 - Springer
Steganography hides the existence of the data inside any cover file. There are different file
formats used in steganography like text, image, audio and video. Out of these file formats …

New mp3 steganography data set

MS Atoum - 2015 5th International Conference on IT …, 2015 - ieeexplore.ieee.org
The success of audio steganography techniques is to ensure imperceptibility of the
embedded secret message in stego file and withstand any form of intentional or un …

[PDF][PDF] Steganography analysis: efficacy and response-time of current steganalysis software

J Green, I Levstein, CRJ Boggs, T Fenger - J Comput Sci, 2012 - marshall.edu
In least significant bit steganography, a lattice may be observable when running
steganalysis software. In this image, the steganography is contained within the bottom …

Applying AWGN MP3 steganography attack in BiLSB and SLSB techniques

MM Salih, MS Atoum - 2015 4th International Conference on …, 2015 - ieeexplore.ieee.org
Steganography is considered as an advanced emerging method due to its ability to ensure
secured data transmission based on embedding the required secret data in digital …

[PDF][PDF] FSK Modulation Based Image Steganography

A Haboush - class.jpu.edu.jo
Steganography is a method of hiding information inside a cover. Several algorithms were
developed to hide secret messages inside digital media such as image, audio, video and …