By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
A recent trend involves exploiting various information-hiding techniques to empower malware-for example, to bypass mobile device security frameworks or to exfiltrate sensitive …
X Yi, K Yang, X Zhao, Y Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most current audio steganographic methods are content non-adaptive which have poor security and low embedding capacity. This paper proposes a generalized adaptive Huffman …
Due to improvements in defensive systems, network threats are becoming increasingly sophisticated and complex as cybercriminals are using various methods to cloak their …
H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …
Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …
Y Qiu, H Tian, L Tang, W Mazurczyk… - Journal of Information …, 2022 - Elsevier
With the wide application of adaptive multi-rate (AMR) speech coder, steganography and steganalysis based on AMR coded speech streams have become a hot spot in the field of …
X Zhu, Z Lai, Y Liang, J Xiong, J Wu - Applied Soft Computing, 2022 - Elsevier
Image hiding is the process of hiding a secret image in another meaningful image or other carriers so that the secret image remains imperceptible and can be recovered securely at …
Abstract Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perform attacks in a stealthy manner. Another important usage deals with privacy …