Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "steganography" wg kryterium: Temat


Tytuł:
ARPNetSteg : Network Steganography Using Address Resolution Protocol
Autorzy:
Bedi, Punam
Dua, Arti
Powiązania:
https://bibliotekanauki.pl/articles/1844471.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
ARP steganography
covert channel
Address Resolution Protocol
protocol steganography
Opis:
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of Image, Video and Audio Steganography but very little work has been done in Network Steganography. A Network Steganography technique hides data in a Network Data Unit, i.e., a Network Protocol Packet. In this paper we present an algorithm ARPNetSteg that implements Network Steganography using the Address resolution protocol. Our technique is a robust technique that can transfer 44 bits of covert data per ARP reply packet.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 671-677
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Steganography Training : a Case Study from University of Shumen in Bulgaria
Autorzy:
Stanev, S.
Szczypiorski, K.
Powiązania:
https://bibliotekanauki.pl/articles/226114.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
training steganography
computer and network steganography
steganology
cluster systems
parallel staganography
Opis:
This paper summarizes the experience and the learning outcomes of students of the "Informatics" specialty at the Episkop Konstantin Preslavsky University of Shumen (Bulgaria) on the problems of computer and network security as a component of their professional training. It is a continuous process starting from the "Computer steganography" course and turning into diploma papers, masters programs, specializations and PhDs in computer and network steganography. The outcome of this training would be bachelors and masters theses, practical activities of experimentation of stego software and steganology in a parallel computing environment, joint scientific publications of lecturers and students.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 3; 315-318
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Network Information Hiding and Science 2.0 : Can it be a Match?
Autorzy:
Wendzel, S.
Caviglione, L.
Mazurczyk, W.
Lalande, J. F.
Powiązania:
https://bibliotekanauki.pl/articles/226567.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
information hiding
steganography
Science 2.0
open science
covert channel
Opis:
Science 2.0 aims at using the information sharing and collaborative features of the Internet to offer new features to the research community. Science 2.0 has been already applied to computer sciences, especially bioinformatics. For network information hiding, a field studying the possibility of concealing a communication in networks, the application of Science 2.0 is still a rather uncovered territory. To foster the discussion of potential benefits for network information hiding, we provide a disquisition for six different Science 2.0 aspects when applied to this domain.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 217-222
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Privacy and security of data on mobile devices with Android and Windows Phone operating systems
Autorzy:
Pawłowicz, B.
Tybura, M.
Powiązania:
https://bibliotekanauki.pl/articles/114652.pdf
Data publikacji:
2017
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
security
mobile
steganography
cryptography
Opis:
The paper focuses on three significant aspects which can improve safety of data and also increasing privacy of users using tablets and smartphones. The chosen platforms are Android and Windows Phone. The aim of the work is to develop library independent from operating system API that enables encrypting and hiding the data stored in mobile device. Also applications that demonstrate functions of the library was developed. The library will be used in securing data from NFC modules used as RFID readers.
Źródło:
Measurement Automation Monitoring; 2017, 63, 1; 28-31
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hidden message techniques in e-commerce
Autorzy:
Mosorov, Volodymyr
Marian Niedźwiedziński, Marian
Powiązania:
https://bibliotekanauki.pl/articles/431899.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
steganography
security
e-commerce
Opis:
The rapid growth in e-commerce applications via the Internet in recent decades is the reason why both small office and corporation users have a need to protect their data transactions through the Internet. These data transactions include sensitive document transfer, digital signature authentication and digital data storage. The use of digital steganography for information security in various e-commerce applications through the Internet are discussed in detail in this article. These applications include digital signature authentication and validation of electronic documents, digital data storage as well as secure communication of multimedia data through the open channels.
Źródło:
Informatyka Ekonomiczna; 2013, 1(27); 56-66
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Network Steganography in the DNS Protocol
Autorzy:
Drzymała, M.
Szczypiorski, K.
Urbański, M. Ł.
Powiązania:
https://bibliotekanauki.pl/articles/227099.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
DNS
network steganography
malware
Opis:
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 4; 343-346
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Steganography usage to control multimedia stream
Autorzy:
Koziel, G
Powiązania:
https://bibliotekanauki.pl/articles/102993.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
steganography
multimedia streams
player
Opis:
In the paper, a proposal of new application for steganography is presented. It is possible to use steganographic techniques to control multimedia stream playback. Special control markers can be included in the sound signal and the player can detect markers and modify the playback parameters according to the hidden instructions. This solution allows for remembering user preferences within the audio track as well as allowing for preparation of various versions of the same content at the production level.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 21; 5-8
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Payload Enhancement on Least Significant Bit Image Steganography Using Edge Area Dilation
Autorzy:
Setiadi, De Rosal Ignatius Moses
Powiązania:
https://bibliotekanauki.pl/articles/226376.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
edge
dilation
image
payload
steganography
Opis:
This research proposes a method to enhance the payload message by embedding messages on the dilated edge areas by the Least Significant Bit (LSB) method. To add security aspects to messages, messages are not embedded directly on the LSB but encrypted with XOR operations with Most Significant Bit (MSB). The experimental results of the test in this study showed that the dilation process to some extent can increase the payload of 18.65% and the average bpp is 1.42 while maintaining the imperceptibilty quality of stego image with an average PSNR value of about 47 dB, SSIM is 0.9977 and MSE is 1.13.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 287-292
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Steganographic algorithm of hiding information in sound based on Fourier transform and masking
Autorzy:
Kozieł, G.
Powiązania:
https://bibliotekanauki.pl/articles/206286.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
keywords steganography
hidden communication
Fourier transform
Opis:
A new steganographicmethod based on Fourier transform is proposed. Data is attached in the frequency domain within the limits of the audible band. Masked frequencies are used to conceal information in order to make the changes inaudible for human ear. This approach allows for modification in the sound frequency band only, and does not require any additional modifications. It also allows for concealing information efficiently, minimizing the number of changes and gaining robustness with respect to popular sound transformations.
Źródło:
Control and Cybernetics; 2011, 40, 4; 1231-1247
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Watermarking software in practical applications
Autorzy:
Lipiński, P.
Powiązania:
https://bibliotekanauki.pl/articles/202385.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
watermarking
digital watermarking
robust watermarking
steganography
Opis:
In the recent years, several digital watermarking applications have been developed for copyright protection of digital images. In this article we have tested how they perform in practical applications. We have identified the most common operations performed by professional photographers and web developers, and tested the robustness of watermarks embedded using the applications for copyright watermarking. Our aim was to prove that commercially available software does not meet the requirements of photography and web industry. We have also identified areas in which the software should be improved in order to meet current and future requirements of the industry.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2011, 59, 1; 21-25
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Least Significant Bit Steganography using Hitzl-Zele Chaotic Map
Autorzy:
Kordov, K.
Stoyanov, B.
Powiązania:
https://bibliotekanauki.pl/articles/226663.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
steganography
steganalysis
chaotic functions
pseudorandom number generator
Opis:
We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. On the first step a pseudorandom generator is constructed for chaotic pixel selection for hiding the secret message. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 4; 417-422
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development and implementation of hash function for generating hashed message
Autorzy:
Noroozi, E.
Ghaeedi, A.
Powiązania:
https://bibliotekanauki.pl/articles/103361.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
digital signature
steganography
bandwidth
authentication
hash message
Opis:
Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.
Źródło:
Advances in Science and Technology. Research Journal; 2016, 10, 31; 31-39
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Stego.docx : hidden communication system using docx files
Stego.docx : system ukrytej komunikacji wykorzystujący pliki .docx
Autorzy:
Kaczyński, K.
Powiązania:
https://bibliotekanauki.pl/articles/209395.pdf
Data publikacji:
2012
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
steganografia
stegoanaliza
docx
Office
Word
Microsoft
steganography
steganalysis
Opis:
Stego.docx is a proposition of a simple steganographic system using some properties typical for the docx files. The proposed stegosystem meets the requirements for the first and the fourth protection level (with and without randomization). The paper contains specification of the Office Open XML and the WordProcessingML standards and classification of steganographic systems. Proposed stegosystem was implemented using Microsoft Visual Studio 2010 and .NET Framework 4.0. The analysis of the output data proved correctness of the Stego.docx stegosystem.
W artykule przedstawiono propozycję systemu steganograficznego wykorzystującego pliki .docx. Przedstawiona została specyfikacja standardu Office Open XML i WordProcessingML oraz klasyfikacja systemów steganograficznych. Wykonano implementację zaproponowanego stegosystemu z wykorzystaniem środowiska Microsoft Visual Studio 2010 i .NET Framework 4.0. Analiza uzyskanych wyników potwierdziła prawidłowość działania opisanego stegosystemu.
Źródło:
Biuletyn Wojskowej Akademii Technicznej; 2012, 61, 4; 325-342
1234-5865
Pojawia się w:
Biuletyn Wojskowej Akademii Technicznej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Security issues on digital watermarking algorithms
Autorzy:
Wójtowicz, W.
Ogiela, M. R.
Powiązania:
https://bibliotekanauki.pl/articles/106206.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
digital watermarking
security
steganography
Discrete Wavelet Transform
DWT
Opis:
This paper gives a general introduction to the digital watermarking procedures and their security aspects. The first issue is to clarify unifying and differentiating properties of steganography and watermarking. Then the most important aspects of digital watermarking are reviewed by studying application, requirement and design problems. We put emphasis on the importance of digital watermark as an effective technology to protect intellectual property rights and legitimate use of digital images. In the paper we provide an overview of the most popular digital watermarking methods for still images available today. The watermarking algorithms are divided into two major categories of spatial and transform domains. Because of outstanding robustness and imperceptibility the transform domain algorithms are the mainstream of research. Popular transforms of images include the DFT (Discrete Fourier Transform) ([1, 2, 3, 4, 5]), DCT (Discrete Cosine Transform) ([1, 3, 6, 5]) and DWT (Discrete Wavelet Transform) ([1, 3, 4, 7, 6, 5]). In the paper we emphasize the advantageous features of DWT such as local time-frequency and multi-scale analysis, preserving the quality of host image and ensuring high robustness of watermark. Finally, we present three algorithms which are based on the combination of DWT and some other transformations like DFT ([4]), DCT ([6]) and the Arnold transform ([7, 6]). Finally, we discuss security requirements and possible attacks on the watermarking systems.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 123-139
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Network steganography method for user’s identity confirmation in web applications
Metoda steganografii sieciowej dla potwierdzania tosamoci uytkownika w aplikacjach webowych
Autorzy:
Buchwald, P.
Rostański, M.
Mączka, K.
Powiązania:
https://bibliotekanauki.pl/articles/375861.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
HTTP
network steganography
web applications
steganografia sieciowa
aplikacje internetowe
Opis:
Extensive use of computer networks is associated with the development of various effective methods that are suitable for hiding information in the contents transferred over the network. These methods are described as network steganography. Since web applications use HTTP protocol to transmit the requests to the server and send the answers to the final recipient, specifically HTTP protocol is ideal for hiding information. For example, there are several methods that can be used to transmit the additional content in the HTTP header. In this paper, we present authors’ evaluation method for network steganography using HTTP specific properties and evaluate the effectiveness of some techniques, providing experimental results.
Szerokie zastosowanie sieci komputerowej jest związane z rozwojem wielu skutecznych metod, które są odpowiednie do ukrywania informacji w treściach przesyłanych poprzez sieć. Metody te są określane mianem steganografii sieciowej. Ponieważ aplikacje internetowe używają protokołu HTTP do przesyłania żądań do serwera i wysyłania odpowiedzi do końcowego odbiorcy, protokół HTTP jest idealny do ukrywania informacji w szczególności. Na przykład, istnieje kilka metod, które mogą być wykorzystane do przesyłania zawartości dodatkowych w nagłówku HTTP. W tym artykule przedstawiono autorski sposób oceny metod steganografii sieciowej za pomocą konkretnych właściwości HTTP i dokonano oceny skuteczności niektórych technik, podając wyniki doświadczalne.
Źródło:
Theoretical and Applied Informatics; 2014, 26, 3-4; 177-187
1896-5334
Pojawia się w:
Theoretical and Applied Informatics
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies