A novel active warden steganographic attack for next-generation steganography
A Sharp, Q Qi, Y Yang, D Peng… - 2013 9th International …, 2013 - ieeexplore.ieee.org
Digital steganography is often divided into two categories of research: steganographer and
attacker, where a steganographer attempts to successfully hide the existence of hidden data …
attacker, where a steganographer attempts to successfully hide the existence of hidden data …
Steganography attack based on discrete spring transform and image geometrization
Q Qi, A Sharp, Y Yang, D Peng… - … and Mobile Computing …, 2014 - ieeexplore.ieee.org
In order to prevent harmful secret information sharing by steganography, a new active-
warden countermeasure approach against steganography is proposed in this paper …
warden countermeasure approach against steganography is proposed in this paper …
Generic attack against robust steganography based on spring transform and geometrization
Q Qi, A Sharp, D Peng, Y Yang… - Security and …, 2016 - Wiley Online Library
There have been many robust image steganography methods that are invented in recent
decades. However, this technique also may be used by malicious users to transmit …
decades. However, this technique also may be used by malicious users to transmit …
Frequency domain discrete spring transform: A novel frequency domain steganographic attack
A Sharp, Q Qi, Y Yang, D Peng… - 2014 9th International …, 2014 - ieeexplore.ieee.org
Digital steganography explores hiding information within a given media. It is critical to
develop methods which block such secret data communication. We have proposed the …
develop methods which block such secret data communication. We have proposed the …
A framework for effective watermarking synchronous with time and frequency domain for resilience to attacks
R Shahabadkar… - 2019 Fifth International …, 2019 - ieeexplore.ieee.org
Digital watermarking emerges as a very effective tool that provides digital media with the
advantages of authentication, integrity verification, ownership protection, and rights …
advantages of authentication, integrity verification, ownership protection, and rights …
[图书][B] A novel approach towards real-time covert timing channel detection
F Rezaei - 2015 - search.proquest.com
Today's world of data communication and networks has become, and will continue to be, an
inevitable part of people's lives. Communication technologies, network resources, and …
inevitable part of people's lives. Communication technologies, network resources, and …
[图书][B] The Discrete Spring Transform: An Innovative Steganographic Attack
AT Sharp - 2017 - search.proquest.com
Digital Steganography continues to evolve today, where steganographers are constantly
discovering new methodologies to hide information effectively. Despite this, steganographic …
discovering new methodologies to hide information effectively. Despite this, steganographic …