A generic taxonomy for steganography methods

S Wendzel, L Caviglione, W Mazurczyk, A Mileva… - Authorea …, 2023 - techrxiv.org
A unified understanding of terms and their applicability is essential for every scientific
discipline: steganography is no exception. Being divided into several domains (for instance …

Enhanced confix stripping stemmer and cosine similarity for search engine in the holy qur'an translation

A Jauhari, IO Suzanti, YD Pramudita… - 2020 6th Information …, 2020 - ieeexplore.ieee.org
The Holy Qur'an is a Muslim guidelines book. The Holy Qur'an has been translated into
many languages to make it easier to understand the meaning of every verse. The lack of …

A novel active warden steganographic attack for next-generation steganography

A Sharp, Q Qi, Y Yang, D Peng… - 2013 9th International …, 2013 - ieeexplore.ieee.org
Digital steganography is often divided into two categories of research: steganographer and
attacker, where a steganographer attempts to successfully hide the existence of hidden data …

Steganography attack based on discrete spring transform and image geometrization

Q Qi, A Sharp, Y Yang, D Peng… - … and Mobile Computing …, 2014 - ieeexplore.ieee.org
In order to prevent harmful secret information sharing by steganography, a new active-
warden countermeasure approach against steganography is proposed in this paper …

[PDF][PDF] Manipulating the Perception of Paragraph Breaks: A New Theoretical Model of Textual Steganography Using Paragraphs

AAAE Bukhelli - 2023 - pure.port.ac.uk
The ancient technique of information hiding known as text steganography has enjoyed much
research in recent years due to the rising popularity of social media platforms, and the …

Applying Covert Channel in TCP Fast Open (TFO)

MA Aziz - 2019 - search.proquest.com
Covert channel is one of the techniques that is used in information hiding. It uses
communication channel as a medium for transmitting hidden information. There are two …

Applying covert channel in TCP Fast Open (TFO)/Mohamed Azran Aziz

A Mohamed Azran - 2019 - studentsrepo.um.edu.my
Covert channel is one of the techniques that is used in information hiding. It uses
communication channel as a medium for transmitting hidden information. There are two …

A Novel Active Warden Technique for Image Steganography

I Bisio, F Lavagetto, G Luzzati… - 2016 IEEE Global …, 2016 - ieeexplore.ieee.org
This paper focuses on countering data hiding in images. Specifically, we refer to the active
warden problem, a process which aims at disrupting the covert communications that are …

[引用][C] A novel approach of LSB based steganography using parity checker

A Tahir, D Amit - International Journal of Advanced Research in …, 2015