A comprehensive survey of covert communication techniques, limitations and future challenges
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …
while in processing. However, it is not always the optimum choice as attackers know the …
Comparative study of digital audio steganography techniques
The rapid spread in digital data usage in many real life applications have urged new and
effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by …
effective ways to ensure their security. Efficient secrecy can be achieved, at least in part, by …
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
Audio steganography is the process of hiding a message inside an audio container. This
study aims to present a systematic review of audio steganography methods. Existing reviews …
study aims to present a systematic review of audio steganography methods. Existing reviews …
Semi-fragile watermarking scheme based on perceptual hash function (PHF) for image tampering detection
H Rhayma, A Makhloufi, H Hamam… - Multimedia Tools and …, 2021 - Springer
The increasing performances of personal computers, as well as software of image
processing, enable the easy manipulation of digital media content. Unfortunately, this easy …
processing, enable the easy manipulation of digital media content. Unfortunately, this easy …
The design and implementation of a steganographic communication system over in-band acoustical channels
This article presents SoundSticker, a system for steganographic, in-band data
communication over an acoustic channel. In contrast with recent works that hide bits in …
communication over an acoustic channel. In contrast with recent works that hide bits in …
The adaptive multi-level phase coding method in audio steganography
Audio steganography allows and inspires many researchers to design methods for secure
communication. Based on the evaluation on the existing methods, it was found that most …
communication. Based on the evaluation on the existing methods, it was found that most …
Electromyography signal based hand gesture classification system using Hilbert Huang transform and deep neural networks
Y Fouad, MEM Soudagar - Heliyon, 2024 - cell.com
This research aims to provide the groundwork for smartly categorizing hand movements for
use with prosthetic hands. The hand motions are classified using surface electromyography …
use with prosthetic hands. The hand motions are classified using surface electromyography …
Securing IoT data using steganography: A practical implementation approach
F Djebbar - Electronics, 2021 - mdpi.com
Adding network connectivity to any “thing” can certainly provide great value, but it also
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
[PDF][PDF] Energy and Entropy Based Features for WAV Audio Steganalysis.
F Djebbar, B Ayad - J. Inf. Hiding Multim. Signal Process., 2017 - bit.nkust.edu.tw
Digital steganalysis techniques attempt to detect hidden information in digital media. The
rising interest in steganalysis is attributed to the growing number of steganography …
rising interest in steganalysis is attributed to the growing number of steganography …
Lightweight noise resilient steganography scheme for Internet of Things
With the recent advent of Internet of Things (IoT), security poses a major critical concern of its
practical implementation. Therefore, it is imperative that the unique security challenges of …
practical implementation. Therefore, it is imperative that the unique security challenges of …