Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








60 Hits in 1.9 sec

Influence of speech codecs selection on transcoding steganography

Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski
2014 Telecommunications Systems  
The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth.  ...  Trancoding steganography (TranSteg) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality.  ...  The typical approach to steganography is to compress the covert data in order to limit its size (it is reasonable in the context of a limited steganographic bandwidth).  ... 
doi:10.1007/s11235-014-9937-9 fatcat:tmd7ac42nrakflus4ec3piic54

Influence of Speech Codecs Selection on Transcoding Steganography [article]

Artur Janicki, Wojciech Mazurczyk, Krzysztof Szczypiorski
2012 arXiv   pre-print
The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth.  ...  TranSteg (Trancoding Steganography) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality.  ...  The typical approach to steganography is to compress the covert data in order to limit its size (it is reasonable in the context of a limited steganographic bandwidth).  ... 
arXiv:1201.6218v1 fatcat:aev4n25mrfbsrp47e2iedh2chu

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography

Jinghui Peng, YiJing Jiang, Shanyu Tang, Farid Meziane
2019 IEEE Transactions on Dependable and Secure Computing  
This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.  ...  Performance evaluation and security analysis indicates that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert communications with high speech  ...  Aoki [16] proposed a lossless steganographic approach for u-law of G.711 codec, which embedded a secret message into '0' speech samples by exploiting the characteristic that a '0' speech sample could  ... 
doi:10.1109/tdsc.2019.2946138 fatcat:3k2uiecvxbd3raphyitydp7jh4

Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication [article]

Boulat A. Bash and Dennis Goeckel and Saikat Guha and Don Towsley
2015 arXiv   pre-print
After reviewing these covert communication systems, this article discusses new results on the fundamental limits of their capabilities, as well as provides a vision for the future of such systems.  ...  Various covert communication techniques were developed to address these concerns, including steganography for finite-alphabet noiseless applications and spread-spectrum systems for wireless communications  ...  ACKNOWLEDGEMENT We are grateful to Matthieu Bloch, Gerhard Kramer, and Sid Jaggi for discussions and comments on a draft of this article.  ... 
arXiv:1506.00066v1 fatcat:u3y7mtpguzfgrk73v3bgmx5buy

An efficient and secure VoIP communication system with chaotic mapping and message digest

Yijing Jiang, Shanyu Tang
2017 Multimedia Systems  
The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data.  ...  To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams.  ...  [24] designed an M-sequence-based LSB steganographic algorithm for embedding information in VoIP streams encoded by G.729a codec.  ... 
doi:10.1007/s00530-017-0565-6 fatcat:dgb22oy5obfuhjge5tabeywg6u

Data Masking: A New Approach for Steganography?

Regunathan Radhakrishnan, Mehdi Kharrazi, Nasir Memon
2005 Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology  
We show that our approach can potentially give a covert channel capacity which is an order of magnitude higher than traditional steganography.  ...  Our experiments also show that steganalyzers trained with stego objects of known steganographic have a low detection accuracy for datamasked multimedia objects.  ...  We are also grateful to Hamza Ozer (National Research Institute of Electronics and Cryptology, Marmara Research Center, Gebze, Turkey) for Data Masking: A New Approach for Steganography?  ... 
doi:10.1007/s11265-005-4153-1 fatcat:hfsvrafimrc5fifyajqarersze

Learning to Generate Steganographic Cover for Audio Steganography using GAN

Lang Chen, Rangding Wang, Diqun Yan, Jie Wang
2021 IEEE Access  
(a) (b) and (c) are the original waveform, the steganographic audio waveform and the residual waveform between (a) and (b), respectively.  ...  The waveform and spectrogram for stego audio are also similar to the steganographic cover audio.  ... 
doi:10.1109/access.2021.3090445 fatcat:jahetjqwgjcapmz7qsqu3o2f3q

Stealthy Protocols: Metrics and Open Problems [chapter]

Olga Chen, Catherine Meadows, Gautam Trivedi
2016 Lecture Notes in Computer Science  
Although stealthy communication and information hiding have been studied from a number of different points of view, e.g. image steganography, network covert channels, and covert wireless communication,  ...  This paper is a survey of both methods that could be used to support stealthy communication over both wired and wireless networks and techniques for evaluating them.  ...  Van Horenbeck [19] also presents a covert channel approach by integrating the covert data into the HTTP request string.  ... 
doi:10.1007/978-3-319-51046-0_1 fatcat:vawdhhrdgzdmbfcskp6bg3hkx4

Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying [article]

Salvatore D'Oro, Francesco Restuccia, Tommaso Melodia
2019 arXiv   pre-print
To address this issue, wireless steganography hides covert information inside primary information by slightly modifying the transmitted waveform such that primary information will still be decodable, while  ...  channel as a function of different channel conditions; and ii) to make sure that the covert channel is undetectable.  ...  steganographic wireless communications is still a (very challenging) open research problem, which we leave for future work.  ... 
arXiv:1905.02250v1 fatcat:za62qdscf5g27bvkv24ef5ahga

An Enhanced Steganographic Code and Its Application in Voice-over-IP Steganography

lejun zhang, xiaoyan hu, Waqas Rasheed, Tianwen Huang, chunhui zhao, chunhui zhao
2019 IEEE Access  
Therefore, a steganographic algorithm combining F5 and simplified wet paper code (SWPC) algorithm is proposed.  ...  The experimental results demonstrate that the proposed scheme can achieve relatively better IP speech data steganographic transparency and that it can outperform F5-WPC and SWPC approaches.  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper.  ... 
doi:10.1109/access.2019.2930133 fatcat:2ro2reqxljftldstv3ykydw4gy

Recent Developments in Covert Acoustical Communications

Michael Hanspach, Michael Goetz
2014 Sicherheit  
Finally,w ed escribe the implementation of an audio intrusion detection system that is designed for automatic analysis of acoustical emanations. 1I ntroduction Covert acoustical communication in air is  ...  communications, we present an analysis on detection and localization mechanisms for covert acoustical transmissions.  ...  Acknowledgment We would liketothank JörgKeller for helpful comments and Ivor Nissen for making this research possible.  ... 
dblp:conf/sicherheit/HanspachG14 fatcat:zpzc4narb5g2lmjzcogpnzksy4

Towards Robust Image-in-Audio Deep Steganography [article]

Jaume Ros, Margarita Geleta, Jordi Pons, Xavier Giro-i-Nieto
2023 arXiv   pre-print
within signals of a different nature.  ...  The results demonstrate that our approach outperforms the existing method in terms of robustness and perceptual transparency.  ...  Acknowledgements We express our gratitude to Pau Bernat Rodríguez for his discussions throughout this study and his contributions to the project codebase.  ... 
arXiv:2303.05007v2 fatcat:v5zrj6wlvfa3vdouf4i36vqjkq

Adaptive Software Radio Steganography [article]

David E. Robillard
2013 arXiv   pre-print
This approach is also adaptive; the covertness of the hidden channel is simple to control via a single continuous parameter either manually or automatically.  ...  Results show this to be a feasible method with a reasonable trade-off between performance and covertness.  ...  The GNU radio modulation and demodulation modules were not designed for dynamic constellation manipulation.  ... 
arXiv:1304.7324v1 fatcat:ko6xyugifnhopkwbiuijlb5zvi

ThermoSteg—Covert Channel for Microbolometer Thermographic Cameras

Krzysztof Sawicki, Grzegorz Bieszczad, Tomasz Sosnowski
2021 Sensors  
The covert channel created with the ThermoSteg method allows the transmission of covert data using a thermal sensor as a wireless data transmitter.  ...  This article describes a physical phenomenon that is exploited by the ThermoSteg method and two proposed methods of covert data extraction, and presents the results of experiments.  ...  Covert channels can be designed with different approaches: using unused bits in network protocol headers, modifying time-dependent parameters, or by using phenomena that are, in most cases, treated as  ... 
doi:10.3390/s21196395 pmid:34640716 fatcat:bl2fyuhxi5f2fg6wptpqsgymmy

A Study of Steganography Based Data Hiding Techniques

Vijay Kumar Sharma, Devesh Kr Srivastava, Pratistha Mathur
2017 International Journal of Emerging Research in Management and Technology  
This paper presents a review on steganography techniques and their uses and attacks on these. The steganography is commonly known as covert writing and mainly used in hidden communication.  ...  A reliable internet communication is free from the attacks on it.  ...  The DCT is "a technique for expressing a waveform as a weighted sum of cosines" [9] . In a JPEG file, the image is made up of DCT coefficient.  ... 
doi:10.23956/ijermt/sv6n4/134 fatcat:icrro5cf6zcmfcfpxbp243ztxe
« Previous Showing results 1 — 15 out of 60 results