Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Trends in steganography

E Zielińska, W Mazurczyk, K Szczypiorski - Communications of the ACM, 2014 - dl.acm.org
Trends in steganography Page 1 86 communications of the acm | march 2014 | vol. 57 | no. 3
review articles ar t b y an D ri J bor ys a ssocia te s the Mass Media anointed 2011 as the "year …

Principles and overview of network steganography

J Lubacz, W Mazurczyk… - IEEE Communications …, 2014 - ieeexplore.ieee.org
Principles and overview of network steganography Page 1 IEEE Communications
Magazine • May 2014 225 0163-6804/14/$25.00 © 2014 IEEE Józef Lubacz, Wojciech …

A firewall concept for both control-flow and data-flow in regression integration testing

LJ White, HKN Leung - Proceedings Conference on Software …, 1992 - computer.org
Due to improvements in defensive systems, network threats are becoming increasingly
sophisticated and complex as cybercriminals are using various methods to cloak their …

[HTML][HTML] Covert channels in TCP/IP protocol stack-extended version

A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have
institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …

[HTML][HTML] An authentication scheme for FANET packet payload using data hiding

D Mallikarachchi, KS Wong, JMY Lim - Journal of Information Security and …, 2023 - Elsevier
Flying ad hoc networks (FANETs) are gaining much traction in recent years due to their wide
range of applications, resulting in the emergence of a number of studies on the facilitation of …

A secure stop and wait communication protocol for disturbed networks

V Shukla, A Chaturvedi, N Srivastava - Wireless personal communications, 2020 - Springer
Secure data communication is the need of hour today specifically when the wireless
communication channel is insecure. We are proposing a protocol which can be customized …

Towards deriving insights into data hiding methods using pattern-based approach

W Mazurczyk, S Wendzel, K Cabaj - Proceedings of the 13th …, 2018 - dl.acm.org
In network information hiding, hiding patterns are used to describe hiding methods and their
taxonomy. In this paper, we analyze the current state of hiding patterns and we further …

Packet padding for improving privacy in consumer IoT

AJ Pinheiro, JM Bezerra… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Traffic analysis of side-channel information represents a major concern in consumer IoT
privacy, since it can lead to a leakage of user data and behavior. In this paper, we propose a …

[HTML][HTML] Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

I Haverkamp, DK Sarmah - International Journal of Information Security, 2024 - Springer
In today's interconnected world, safeguarding digital data's confidentiality and security is
crucial. Cryptography and steganography are two primary methods used for information …