A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Influence of speech codecs selection on transcoding steganography
2014
Telecommunications Systems
The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth. ...
Trancoding steganography (TranSteg) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality. ...
The typical approach to steganography is to compress the covert data in order to limit its size (it is reasonable in the context of a limited steganographic bandwidth). ...
doi:10.1007/s11235-014-9937-9
fatcat:tmd7ac42nrakflus4ec3piic54
Influence of Speech Codecs Selection on Transcoding Steganography
[article]
2012
arXiv
pre-print
The typical approach to steganography is to compress the covert data in order to limit its size, which is reasonable in the context of a limited steganographic bandwidth. ...
TranSteg (Trancoding Steganography) is a new IP telephony steganographic method that was recently proposed that offers high steganographic bandwidth while retaining good voice quality. ...
The typical approach to steganography is to compress the covert data in order to limit its size (it is reasonable in the context of a limited steganographic bandwidth). ...
arXiv:1201.6218v1
fatcat:aev4n25mrfbsrp47e2iedh2chu
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography
2019
IEEE Transactions on Dependable and Secure Computing
This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet. ...
Performance evaluation and security analysis indicates that the proposed VoIP steganographic scheme can withstand statistical detection, and achieve secure real-time covert communications with high speech ...
Aoki [16] proposed a lossless steganographic approach for u-law of G.711 codec, which embedded a secret message into '0' speech samples by exploiting the characteristic that a '0' speech sample could ...
doi:10.1109/tdsc.2019.2946138
fatcat:3k2uiecvxbd3raphyitydp7jh4
Hiding Information in Noise: Fundamental Limits of Covert Wireless Communication
[article]
2015
arXiv
pre-print
After reviewing these covert communication systems, this article discusses new results on the fundamental limits of their capabilities, as well as provides a vision for the future of such systems. ...
Various covert communication techniques were developed to address these concerns, including steganography for finite-alphabet noiseless applications and spread-spectrum systems for wireless communications ...
ACKNOWLEDGEMENT We are grateful to Matthieu Bloch, Gerhard Kramer, and Sid Jaggi for discussions and comments on a draft of this article. ...
arXiv:1506.00066v1
fatcat:u3y7mtpguzfgrk73v3bgmx5buy
An efficient and secure VoIP communication system with chaotic mapping and message digest
2017
Multimedia Systems
The proposed covert VoIP communications system not only achieved high quality of VoIP and prevented detection of statistical analysis, but also provided integrity for secret data. ...
To protect data security, a new covert VoIP communications system was proposed in this study to realize secure communications by hiding secret information in VoIP streams. ...
[24] designed an M-sequence-based LSB steganographic algorithm for embedding information in VoIP streams encoded by G.729a codec. ...
doi:10.1007/s00530-017-0565-6
fatcat:dgb22oy5obfuhjge5tabeywg6u
Data Masking: A New Approach for Steganography?
2005
Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology
We show that our approach can potentially give a covert channel capacity which is an order of magnitude higher than traditional steganography. ...
Our experiments also show that steganalyzers trained with stego objects of known steganographic have a low detection accuracy for datamasked multimedia objects. ...
We are also grateful to Hamza Ozer (National Research Institute of Electronics and Cryptology, Marmara Research Center, Gebze, Turkey) for Data Masking: A New Approach for Steganography? ...
doi:10.1007/s11265-005-4153-1
fatcat:hfsvrafimrc5fifyajqarersze
Learning to Generate Steganographic Cover for Audio Steganography using GAN
2021
IEEE Access
(a) (b) and (c) are the original waveform, the steganographic audio waveform and the residual waveform between (a) and (b), respectively. ...
The waveform and spectrogram for stego audio are also similar to the steganographic cover audio. ...
doi:10.1109/access.2021.3090445
fatcat:jahetjqwgjcapmz7qsqu3o2f3q
Stealthy Protocols: Metrics and Open Problems
[chapter]
2016
Lecture Notes in Computer Science
Although stealthy communication and information hiding have been studied from a number of different points of view, e.g. image steganography, network covert channels, and covert wireless communication, ...
This paper is a survey of both methods that could be used to support stealthy communication over both wired and wireless networks and techniques for evaluating them. ...
Van Horenbeck [19] also presents a covert channel approach by integrating the covert data into the HTTP request string. ...
doi:10.1007/978-3-319-51046-0_1
fatcat:vawdhhrdgzdmbfcskp6bg3hkx4
Hiding Data in Plain Sight: Undetectable Wireless Communications Through Pseudo-Noise Asymmetric Shift Keying
[article]
2019
arXiv
pre-print
To address this issue, wireless steganography hides covert information inside primary information by slightly modifying the transmitted waveform such that primary information will still be decodable, while ...
channel as a function of different channel conditions; and ii) to make sure that the covert channel is undetectable. ...
steganographic wireless communications is still a (very challenging) open research problem, which we leave for future work. ...
arXiv:1905.02250v1
fatcat:za62qdscf5g27bvkv24ef5ahga
An Enhanced Steganographic Code and Its Application in Voice-over-IP Steganography
2019
IEEE Access
Therefore, a steganographic algorithm combining F5 and simplified wet paper code (SWPC) algorithm is proposed. ...
The experimental results demonstrate that the proposed scheme can achieve relatively better IP speech data steganographic transparency and that it can outperform F5-WPC and SWPC approaches. ...
ACKNOWLEDGMENT The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. ...
doi:10.1109/access.2019.2930133
fatcat:2ro2reqxljftldstv3ykydw4gy
Recent Developments in Covert Acoustical Communications
2014
Sicherheit
Finally,w ed escribe the implementation of an audio intrusion detection system that is designed for automatic analysis of acoustical emanations. 1I ntroduction Covert acoustical communication in air is ...
communications, we present an analysis on detection and localization mechanisms for covert acoustical transmissions. ...
Acknowledgment We would liketothank JörgKeller for helpful comments and Ivor Nissen for making this research possible. ...
dblp:conf/sicherheit/HanspachG14
fatcat:zpzc4narb5g2lmjzcogpnzksy4
Towards Robust Image-in-Audio Deep Steganography
[article]
2023
arXiv
pre-print
within signals of a different nature. ...
The results demonstrate that our approach outperforms the existing method in terms of robustness and perceptual transparency. ...
Acknowledgements We express our gratitude to Pau Bernat Rodríguez for his discussions throughout this study and his contributions to the project codebase. ...
arXiv:2303.05007v2
fatcat:v5zrj6wlvfa3vdouf4i36vqjkq
Adaptive Software Radio Steganography
[article]
2013
arXiv
pre-print
This approach is also adaptive; the covertness of the hidden channel is simple to control via a single continuous parameter either manually or automatically. ...
Results show this to be a feasible method with a reasonable trade-off between performance and covertness. ...
The GNU radio modulation and demodulation modules were not designed for dynamic constellation manipulation. ...
arXiv:1304.7324v1
fatcat:ko6xyugifnhopkwbiuijlb5zvi
ThermoSteg—Covert Channel for Microbolometer Thermographic Cameras
2021
Sensors
The covert channel created with the ThermoSteg method allows the transmission of covert data using a thermal sensor as a wireless data transmitter. ...
This article describes a physical phenomenon that is exploited by the ThermoSteg method and two proposed methods of covert data extraction, and presents the results of experiments. ...
Covert channels can be designed with different approaches: using unused bits in network protocol headers, modifying time-dependent parameters, or by using phenomena that are, in most cases, treated as ...
doi:10.3390/s21196395
pmid:34640716
fatcat:bl2fyuhxi5f2fg6wptpqsgymmy
A Study of Steganography Based Data Hiding Techniques
2017
International Journal of Emerging Research in Management and Technology
This paper presents a review on steganography techniques and their uses and attacks on these. The steganography is commonly known as covert writing and mainly used in hidden communication. ...
A reliable internet communication is free from the attacks on it. ...
The DCT is "a technique for expressing a waveform as a weighted sum of cosines" [9] . In a JPEG file, the image is made up of DCT coefficient. ...
doi:10.23956/ijermt/sv6n4/134
fatcat:icrro5cf6zcmfcfpxbp243ztxe
« Previous
Showing results 1 — 15 out of 60 results