Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography

O Kuznetsov, E Frontoni, K Chernov - Applied Intelligence, 2024 - Springer
This study investigates the innovative application of Direct Sequence Spread Spectrum
(DSSS) technology in the realm of image steganography, known as Spread Spectrum Image …

[PDF][PDF] Evaluation of various LSB based methods of image steganography on GIF file format

N Tiwari, DM Shandilya - International Journal of Computer …, 2010 - academia.edu
Steganography is the art of hiding the fact that communication is taking place, by hiding
information in other information. Many different carrier file formats can be used, but digital …

Strange Fourier steganography in movies

RT McKeon - 2007 IEEE International Conference on Electro …, 2007 - ieeexplore.ieee.org
Encryption can be easily detected and given enough computational power, any encryption
can be cracked. Steganography provides an alternative to encryption, and a new technique …

Direct spread spectrum technology for data hiding in audio

A Kuznetsov, A Onikiychuk, O Peshkova, T Gancarczyk… - Sensors, 2022 - mdpi.com
Direct spread spectrum technology is traditionally used in radio communication systems with
multiple access, for example, in CDMA standards, in global satellite navigation systems, in …

A robust steganography algorithm based on texture similarity using gabor filter

ZZ Kermani, M Jamzad - Proceedings of the Fifth IEEE …, 2005 - ieeexplore.ieee.org
The main concern of steganography (image hiding) methods is to embed a secret image into
a host image in such a way that the host should remain as similar as possible to its original …

Capacity is the wrong paradigm

IS Moskowitz, LW Chang, RE Newman - … of the 2002 workshop on New …, 2002 - dl.acm.org
At present," capacity" is the prevailing paradigm for covert channels. With respect to
steganography, however, capacity is at best insufficient, and at worst, is incorrect. In this …

The decoy: multi-level digital multimedia steganography model

AJ Al-Najjar - Proceedings of the 12th WSEAS international …, 2008 - dl.acm.org
Define four types of objects: message-object, intermediate-object, cover-object, and stego-
object. All objects are represented by a finite set of elements, where each element is in turn …

Hiding messages in audio files using direct spread spectrum

A Kuznetsov, O Smirnov, V Zhora… - 2021 11th IEEE …, 2021 - ieeexplore.ieee.org
Direct spread spectrum technology is traditionally used in radio communication systems with
multiple access. It ensures high security and reliability of information transfer. In addition …

[PDF][PDF] Стеганографія: навчальний посібник

ОО Кузнецов, СП Євсеєв, ОГ Король, АА Кузнецов… - 2011 - repository.hneu.edu.ua
Розглянуто основні напрями стеганографії, математичну модель та структурну схему
стеганографічної системи, класифікацію систем цифрової стеганографії та їх …

Error correcting code performance for watermark protection

J Darbon, B Sankur, H Maitre - Security and watermarking of …, 2001 - spiedigitallibrary.org
The watermark signals are weakly inserted in images due to imperceptibility constraints
which makes them prone to errors in the extraction stage. Although the error correcting …