Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography
This study investigates the innovative application of Direct Sequence Spread Spectrum
(DSSS) technology in the realm of image steganography, known as Spread Spectrum Image …
(DSSS) technology in the realm of image steganography, known as Spread Spectrum Image …
[PDF][PDF] Evaluation of various LSB based methods of image steganography on GIF file format
N Tiwari, DM Shandilya - International Journal of Computer …, 2010 - academia.edu
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital …
information in other information. Many different carrier file formats can be used, but digital …
Strange Fourier steganography in movies
RT McKeon - 2007 IEEE International Conference on Electro …, 2007 - ieeexplore.ieee.org
Encryption can be easily detected and given enough computational power, any encryption
can be cracked. Steganography provides an alternative to encryption, and a new technique …
can be cracked. Steganography provides an alternative to encryption, and a new technique …
Direct spread spectrum technology for data hiding in audio
Direct spread spectrum technology is traditionally used in radio communication systems with
multiple access, for example, in CDMA standards, in global satellite navigation systems, in …
multiple access, for example, in CDMA standards, in global satellite navigation systems, in …
A robust steganography algorithm based on texture similarity using gabor filter
ZZ Kermani, M Jamzad - Proceedings of the Fifth IEEE …, 2005 - ieeexplore.ieee.org
The main concern of steganography (image hiding) methods is to embed a secret image into
a host image in such a way that the host should remain as similar as possible to its original …
a host image in such a way that the host should remain as similar as possible to its original …
Capacity is the wrong paradigm
IS Moskowitz, LW Chang, RE Newman - … of the 2002 workshop on New …, 2002 - dl.acm.org
At present," capacity" is the prevailing paradigm for covert channels. With respect to
steganography, however, capacity is at best insufficient, and at worst, is incorrect. In this …
steganography, however, capacity is at best insufficient, and at worst, is incorrect. In this …
The decoy: multi-level digital multimedia steganography model
AJ Al-Najjar - Proceedings of the 12th WSEAS international …, 2008 - dl.acm.org
Define four types of objects: message-object, intermediate-object, cover-object, and stego-
object. All objects are represented by a finite set of elements, where each element is in turn …
object. All objects are represented by a finite set of elements, where each element is in turn …
Hiding messages in audio files using direct spread spectrum
Direct spread spectrum technology is traditionally used in radio communication systems with
multiple access. It ensures high security and reliability of information transfer. In addition …
multiple access. It ensures high security and reliability of information transfer. In addition …
[PDF][PDF] Стеганографія: навчальний посібник
Розглянуто основні напрями стеганографії, математичну модель та структурну схему
стеганографічної системи, класифікацію систем цифрової стеганографії та їх …
стеганографічної системи, класифікацію систем цифрової стеганографії та їх …
Error correcting code performance for watermark protection
The watermark signals are weakly inserted in images due to imperceptibility constraints
which makes them prone to errors in the extraction stage. Although the error correcting …
which makes them prone to errors in the extraction stage. Although the error correcting …