A Walk-through towards network steganography techniques

U Pilania, M Kumar, T Rohit, N Nandal - Информатика и …, 2023 - ia.spcras.ru
2D and 3D digital multimedia files offer numerous benefits like excellent quality,
compression, editing, reliable copying, etc. These qualities of the multimedia files, on the …

A novel method of image steganography in DWT domain

V Banoci, G Bugar, D Levický - Proceedings of 21st …, 2011 - ieeexplore.ieee.org
In this paper, we present a novel steganographic method for embedding of secret data in still
grayscale image. In order to provide large capacity of the secret data while maintaining good …

[PDF][PDF] Bit length replacement steganography based on dct coefficients

KBS Kumar, KB Raja, RK Chhotaray… - International Journal of …, 2010 - researchgate.net
Steganography is a means of establishing secret communication through public channel in
an artistic manner. In this paper, we propose Bit Length Replacement Steganography Based …

[PDF][PDF] A new technique based on chaotic steganography and encryption text in DCT domain for color image

MJ Saeed - Journal of Engineering Science and Technology, 2013 - researchgate.net
Image steganography is the art of hiding information into a cover image. This paper presents
a new technique based on chaotic steganography and encryption text in DCT domain for …

Coherent steganography using segmentation and DCT

KBS Kumar, KB Raja, RK Chhotaray… - 2010 IEEE …, 2010 - ieeexplore.ieee.org
The important issue of modern communication is establishing secret communication while
using public channel and is achieved by steganography. In this paper, we propose Coherent …

Histogram secure steganography system in JPEG file based on modulus function

V Banoci, G Bugar, D Levický… - Proceedings of 22nd …, 2012 - ieeexplore.ieee.org
In this paper, we present a novel steganographic method for embedding of secret data in still
grayscale JPEG image. The embedding is performed in DCT domain in JPEG file. Hiding a …

[PDF][PDF] Steganography using RSA algorithm

J Kaur, I Gabba - International Journal of Innovative Technology and …, 2013 - Citeseer
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message, a form …

Adaptive software radio steganography

DE Robillard - arXiv preprint arXiv:1304.7324, 2013 - arxiv.org
This paper presents an adaptable steganography (information hiding) method for digital
radio communication. Many radio steganography methods exist, but most are defined at …

A novel JPEG steganography method secure against histogram steganalysis

D Levický, G Bugár, V Bánoci - Proceedings ELMAR-2012, 2012 - ieeexplore.ieee.org
In this paper, we present a novel JPEG steganography method with histogram preserving
scheme. The embedding is performed in transformation domain of DCT in JPEG file by …

[PDF][PDF] A Novel JPEG Steganography Method Based on Modulus Function with Histogram Analysis.

V Banoci, G Bugar, D Levický, Z Klenovičová - Radioengineering, 2012 - radioeng.cz
In this paper, we present a novel steganographic method for embedding of a secret data in
still grayscale JPEG image. In order to provide large capacity of pro–posed method while …