DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain

Y Chen, H Wang, KKR Choo, P He… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cost assignment plays a key role in coding performance and security of video
steganography. Existing cost assignment methods (for adaptive video steganography) are …

Stegozoa: Enhancing webrtc covert channels with video steganography for internet censorship circumvention

G Figueira, D Barradas, N Santos - Proceedings of the 2022 ACM on …, 2022 - dl.acm.org
Several totalitarian states around the world deploy sophisticated censorship apparatuses to
prevent citizens from freely accessing the Internet. To counter these restrictions, some …

[PDF][PDF] Machine learning-based energy consumption modeling and comparing of H. 264 and Google VP8 encoders

YO Sharrab, M Alsmirat, B Hawashin… - International Journal of …, 2021 - academia.edu
Advancement of the prediction models used in a variety of fields is a result of the contribution
of machine learning approaches. Utilizing such modeling in feature engineering is …

Towards a scalable censorship-resistant overlay network based on webrtc covert channels

D Barradas, N Santos - Proceedings of the 1st International Workshop …, 2020 - dl.acm.org
In many regions of the world, nation-states enforce Internet censorship policies that prevent
unrestricted access to information and services by their citizens. Over the years, many …

Video Enhancement Algorithm using Pre-and Post-Processing for Compressed Videos

S Nandyal, VS Patil - 2023 International Conference for …, 2023 - ieeexplore.ieee.org
The preferred technique for sending picture sequences has quickly evolved to include
standards-based video compression methods. The ITU family of standards and H265 are …

Region of Interest Using Viola-Jones Algorithm for Video Steganography

U Pilania, M Kumar, G Kaur - … Conference on Computing in Engineering & …, 2022 - Springer
Abstract In this paper, Viola-Jones's face detection method is used to find a human face in
videos that act as a Region of Interest. Region of Interest can be used for concealing secret …

[PDF][PDF] Unobservable Multimedia-based Covert Channels for Internet Censorship Circumvention

DMB Barradas - 2021 - cs.uwaterloo.ca
Totalitarian states are known to deploy large-scale surveillance and censorship
mechanisms in order to deter citizens from accessing or publishing information on the …

[CITATION][C] 多媒体隐写研究进展

张卫明, 王宏霞, **斌, 任延珍, 杨忠良, 陈可江… - 2022 - **图象图形学报

[CITATION][C] Stegozoa: Securing the Transmission of Covert Internet Communications over WebRTC

G Figueira - 2021 - Master's thesis, IST, Universidade de …