Sciweavers

28 search results - page 4 / 6
» F5-A Steganographic Algorithm
Sort
View
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
14 years 1 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
MEDIAFORENSICS
2010
13 years 9 months ago
Modern steganalysis can detect YASS
YASS is a steganographic algorithm for digital images that hides messages robustly in a key-dependent transform domain so that the stego image can be subsequently compressed and d...
Jan Kodovský, Tomás Pevný, Je...
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 4 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
CGF
2008
100views more  CGF 2008»
13 years 7 months ago
Distortion-Free Steganography for Polygonal Meshes
We present a technique for steganography in polygonal meshes. Our method hides a message in the indexed representation of a mesh by permuting the order in which faces and vertices...
Alexander Bogomjakov, Craig Gotsman, Martin Isenbu...
TIFS
2010
128views more  TIFS 2010»
13 years 5 months ago
Steganalysis by subtractive pixel adjacency matrix
This paper presents a novel method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which...
Tomás Pevný, Patrick Bas, Jessica J....