Essays about: "Steganography"

Showing result 1 - 5 of 10 essays containing the word Steganography.

  1. 1. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE

  2. 2. What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Kristoffer Björklund; [2021]
    Keywords : Stegomalware; steganography; information hiding; covert channel;

    Abstract : Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. READ MORE

  3. 3. ARMAS: Active Reconstruction of Missing Audio Segments

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Sachin Pokharel; Muhammad Ali; [2021]
    Keywords : Audio Reconstruction; Audio Inpainting; Deep Learning; Machine Learning; Audio Steganography;

    Abstract : Background: Audio signal reconstruction using machine/deep learning algorithms has been explored much more in the recent years, and it has many applications in digital signal processing. There are many research works on audio reconstruction with linear interpolation, phase coding, tone insertion techniques combined with AI models. READ MORE

  4. 4. A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Julius Andersson; David Engström; [2019]
    Keywords : Steganography; Steganalysis; Watermarking; Information hiding; Cryptography; Compression; Non-intrusive; Sturdy; JPEG; Steganografi; Steganalys; Vattenmärkning; Kryptografi; Kompression; Icke störande; Stabil; JPEG;

    Abstract : It is desirable for companies to be able to hide data inside videos to be able to find the source of any unauthorised sharing of a video. The hidden data (the payload) should damage the original data (the cover) by an as small amount as possible while also making it hard to remove the payload without also severely damaging the cover. READ MORE

  5. 5. Blind Image Steganalytic Optimization by using Machine Learning

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Despoina Giarimpampa; [2018]
    Keywords : steganography; steganalysis; machine learning; stelanology;

    Abstract : Since antiquity, steganography has existed in protecting sensitive information against unauthorized unveiling attempts. Nevertheless, digital media’s evolution, reveals that steganography has been used as a tool for activities such as terrorism or child pornography. Given this background, steganalysis arises as an antidote to steganography. READ MORE