Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Steganography integration into a low-bit rate speech codec

Y Huang, C Liu, S Tang, S Bai - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Low bit-rate speech codecs have been widely used in audio communications like VoIP and
mobile communications, so that steganography in low bit-rate audio streams would have …

Audio steganography based on iterative adversarial attacks against convolutional neural networks

J Wu, B Chen, W Luo, Y Fang - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Recently, convolutional neural networks (CNNs) have demonstrated superior performance
on digital multimedia steganalysis. However, some studies have noted that most CNN …

High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain

AH Ali, LE George, AA Zaidan, MR Mokhtar - Multimedia Tools and …, 2018 - Springer
Abstract Information hiding researchers have been exploring techniques to improve the
security of transmitting sensitive data through an unsecured channel. This paper proposes …

AHCM: Adaptive Huffman code mapping for audio steganography based on psychoacoustic model

X Yi, K Yang, X Zhao, Y Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Most current audio steganographic methods are content non-adaptive which have poor
security and low embedding capacity. This paper proposes a generalized adaptive Huffman …

Audio recording location identification using acoustic environment signature

H Zhao, H Malik - IEEE Transactions on Information Forensics …, 2013 - ieeexplore.ieee.org
An audio recording is subject to a number of possible distortions and artifacts. Consider, for
example, artifacts due to acoustic reverberation and background noise. The acoustic …

Provably secure public-key steganography based on elliptic curve cryptography

X Zhang, K Chen, J Ding, Y Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Steganography is the technique of hiding secret messages within seemingly harmless
covers to elude examination by censors. Despite having been proposed several decades …

Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images

Q Liu, Z Chen - ACM Transactions on Intelligent Systems and …, 2014 - dl.acm.org
Steganalysis and forgery detection in image forensics are generally investigated separately.
We have designed a method targeting the detection of both steganography and seam …

Neighboring joint density-based JPEG steganalysis

Q Liu, AH Sung, M Qiao - ACM Transactions on Intelligent Systems and …, 2011 - dl.acm.org
The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for
stealthy communications and other illegal purposes is a serious concern of cyber security …