By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
Trends in steganography Page 1 86 communications of the acm | march 2014 | vol. 57 | no. 3 review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …
The Tor network is designed to provide users with low-latency anonymous communications. Tor clients build circuits with publicly listed relays to anonymously reach their destinations …
Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital …
Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and deploy censorship mechanisms within their networks …
W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic …
H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …
I Memon, Q Ali, A Zubedi, FA Mangi - Multimedia Tools and Applications, 2017 - Springer
Road traffic information has become indispensable for routine vehicular communication but user location privacy an important issue which did not well addressed. An adversary may …
Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be customized …