An ensemble-based stegware detection system for information hiding malware attacks
A Monika, R Eswari - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Abstract Information hiding techniques like steganography are used by hackers to obfuscate
malicious attack codes to carry malware scripts and deliver to crypto-miners in on-demand …
malicious attack codes to carry malware scripts and deliver to crypto-miners in on-demand …
Data Structures Analysis for Text Processing in the Framework of NLP Classification in Polish
U Krzeszewska… - … Conference on Software …, 2022 - ieeexplore.ieee.org
Natural language processing (NLP) involves au-tomating the analysis, understanding,
generation, and translation of the content of written statements. It is done in order to develop …
generation, and translation of the content of written statements. It is done in order to develop …
Deep learning-based image Steganalysis
AK Mshet, HK Tayyeh - AIP Conference Proceedings, 2024 - pubs.aip.org
Steganography involves concealing hidden messages inside various types of media,
whereas steganalysis is the process of identifying the presence of steganography …
whereas steganalysis is the process of identifying the presence of steganography …
[PDF][PDF] A Deep Learning Framework to identify real-world stego images
K Lavania - 2021 - norma.ncirl.ie
Image Steganalysis is the process of identifying images that have been processed using
Steganography to hide information or messages. These images are called stego images …
Steganography to hide information or messages. These images are called stego images …
Classification of Intrusion Affected Stego Images Over a Channel Using Deep Learning Techniques
C Manikandan, MS Lahari, S Meera… - … on Vision Towards …, 2023 - ieeexplore.ieee.org
Image Steganography is a widely used technique to hide secret information in the cover
image for secure transmission. A stego image is subject to many intrusions such as noise …
image for secure transmission. A stego image is subject to many intrusions such as noise …
StegAI: detecting steganography with deep learning
E Beatty, S Carlson - … Business Model Net-Centric Systems and …, 2023 - spiedigitallibrary.org
Adversaries or internal threats wishing to exfiltrate sensitive data may choose a method that
obfuscates the fact that a transfer is even taking place by camouflaging it inside of allowable …
obfuscates the fact that a transfer is even taking place by camouflaging it inside of allowable …
가변 ShiftRows 를 이용한 하이브리드 기법에서 한글 메시지 은닉을 위한 이미지 스테가노그래피
지선수 - 한국정보전자통신기술학회 논문지, 2022 - dbpia.co.kr
현대사회에서 정보는 중요한 역할을 한다. 대부분의 정보는 디지털 공간에서 처리되고,
이동된다. 사이버 공간에서 저항성과 보안성에 기반한 비밀 통신은 기본적인 사항이다 …
이동된다. 사이버 공간에서 저항성과 보안성에 기반한 비밀 통신은 기본적인 사항이다 …