Steganography in modern smartphones and mitigation techniques
W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
Deep learning for diverse data types steganalysis: A review
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …
Steganography integration into a low-bit rate speech codec
Y Huang, C Liu, S Tang, S Bai - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Low bit-rate speech codecs have been widely used in audio communications like VoIP and
mobile communications, so that steganography in low bit-rate audio streams would have …
mobile communications, so that steganography in low bit-rate audio streams would have …
Audio steganography based on iterative adversarial attacks against convolutional neural networks
Recently, convolutional neural networks (CNNs) have demonstrated superior performance
on digital multimedia steganalysis. However, some studies have noted that most CNN …
on digital multimedia steganalysis. However, some studies have noted that most CNN …
High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain
Abstract Information hiding researchers have been exploring techniques to improve the
security of transmitting sensitive data through an unsecured channel. This paper proposes …
security of transmitting sensitive data through an unsecured channel. This paper proposes …
AHCM: Adaptive Huffman code mapping for audio steganography based on psychoacoustic model
Most current audio steganographic methods are content non-adaptive which have poor
security and low embedding capacity. This paper proposes a generalized adaptive Huffman …
security and low embedding capacity. This paper proposes a generalized adaptive Huffman …
Audio recording location identification using acoustic environment signature
An audio recording is subject to a number of possible distortions and artifacts. Consider, for
example, artifacts due to acoustic reverberation and background noise. The acoustic …
example, artifacts due to acoustic reverberation and background noise. The acoustic …
Provably secure public-key steganography based on elliptic curve cryptography
Steganography is the technique of hiding secret messages within seemingly harmless
covers to elude examination by censors. Despite having been proposed several decades …
covers to elude examination by censors. Despite having been proposed several decades …
Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images
Steganalysis and forgery detection in image forensics are generally investigated separately.
We have designed a method targeting the detection of both steganography and seam …
We have designed a method targeting the detection of both steganography and seam …
Neighboring joint density-based JPEG steganalysis
The threat posed by hackers, spies, terrorists, and criminals, etc. using steganography for
stealthy communications and other illegal purposes is a serious concern of cyber security …
stealthy communications and other illegal purposes is a serious concern of cyber security …