By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
Steganography embraces several hiding techniques which spawn across multiple domains. However, the related terminology is not unified among the different domains, such as digital …
The paper presents a new steganographic method for IP telephony called TranSteg (Tran scoding Steg anography). Typically, in steganographic communication it is advised for …
W Mazurczyk - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Steganography is an ancient art that encompasses various techniques of information hiding, the aim of which is to embed secret information into a carrier message. Steganographic …
H Kheddar, D Megías - Applied Intelligence, 2022 - Springer
In this paper, a novel steganographic method for Voice over IP applications—called Steganography-based Interpolation and Auto-Encoding (SIAE)—is proposed. The aim of the …
Secure data communication is the need of hour today specifically when the wireless communication channel is insecure. We are proposing a protocol which can be customized …
We propose and explore the applicability of file timestamps as a steganographic channel. We identify an information gap between storage and usage of timestamps in modern …
H Tian, J Liu, S Li - Multimedia systems, 2014 - Springer
In this study, we mainly concentrate on quantization-index-modulation (QIM) steganography in low bit-rate speech streams, and contribute to improve its security. Exploiting the …
In network information hiding, hiding patterns are used to describe hiding methods and their taxonomy. In this paper, we analyze the current state of hiding patterns and we further …