DDCA: A distortion drift-based cost assignment method for adaptive video steganography in the transform domain
Cost assignment plays a key role in coding performance and security of video
steganography. Existing cost assignment methods (for adaptive video steganography) are …
steganography. Existing cost assignment methods (for adaptive video steganography) are …
Stegozoa: Enhancing webrtc covert channels with video steganography for internet censorship circumvention
Several totalitarian states around the world deploy sophisticated censorship apparatuses to
prevent citizens from freely accessing the Internet. To counter these restrictions, some …
prevent citizens from freely accessing the Internet. To counter these restrictions, some …
[PDF][PDF] Machine learning-based energy consumption modeling and comparing of H. 264 and Google VP8 encoders
Advancement of the prediction models used in a variety of fields is a result of the contribution
of machine learning approaches. Utilizing such modeling in feature engineering is …
of machine learning approaches. Utilizing such modeling in feature engineering is …
Towards a scalable censorship-resistant overlay network based on webrtc covert channels
In many regions of the world, nation-states enforce Internet censorship policies that prevent
unrestricted access to information and services by their citizens. Over the years, many …
unrestricted access to information and services by their citizens. Over the years, many …
Video Enhancement Algorithm using Pre-and Post-Processing for Compressed Videos
S Nandyal, VS Patil - 2023 International Conference for …, 2023 - ieeexplore.ieee.org
The preferred technique for sending picture sequences has quickly evolved to include
standards-based video compression methods. The ITU family of standards and H265 are …
standards-based video compression methods. The ITU family of standards and H265 are …
Region of Interest Using Viola-Jones Algorithm for Video Steganography
Abstract In this paper, Viola-Jones's face detection method is used to find a human face in
videos that act as a Region of Interest. Region of Interest can be used for concealing secret …
videos that act as a Region of Interest. Region of Interest can be used for concealing secret …
[PDF][PDF] Unobservable Multimedia-based Covert Channels for Internet Censorship Circumvention
DMB Barradas - 2021 - cs.uwaterloo.ca
Totalitarian states are known to deploy large-scale surveillance and censorship
mechanisms in order to deter citizens from accessing or publishing information on the …
mechanisms in order to deter citizens from accessing or publishing information on the …
[CITATION][C] 多媒体隐写研究进展
张卫明, 王宏霞, **斌, 任延珍, 杨忠良, 陈可江… - 2022 - **图象图形学报
[CITATION][C] Stegozoa: Securing the Transmission of Covert Internet Communications over WebRTC
G Figueira - 2021 - Master's thesis, IST, Universidade de …