Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Exploring advanced steganography techniques for secure digital image communication: a comparative analysis and performance evaluation
- Rohit Deval,
- Nachiket Gupte,
- Johann Kyle Pinto,
- Adwaita Raj Modak,
- Akshat Verma,
- Anirudh Sharma,
- S.P. Raja
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 17, Issue 1-2Pages 233–266https://doi.org/10.1504/ijesdf.2025.143471This is a digital age. In a world where everything seems to be public, privacy and confidentiality have never been more important. So, the combination of this aspect of our life and this need of our age is the ability to securely hide data in the digital ...
- research-articleDecember 2024
Pulsar: Secure Steganography for Diffusion Models
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4703–4717https://doi.org/10.1145/3658644.3690218Widespread efforts to subvert access to strong cryptography has renewed interest in steganography, the practice of embedding sensitive messages in mundane cover messages. Recent efforts at provably secure steganography have focused on text-based ...
- short-paperOctober 2024
Practical Deep Learning Models for QIM-based VoIP Steganalysis
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 11132–11136https://doi.org/10.1145/3664647.3685646Quantization index modulation (QIM) based VoIP steganography can conceal secret information in VoIP streams. Malicious users could use this technology to conduct illegal activities, threatening network and public security. Hence, practical steganalysis ...
- research-articleOctober 2024
From Covert Hiding To Visual Editing: Robust Generative Video Steganography
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 2757–2765https://doi.org/10.1145/3664647.3681149Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process. Although ...
-
- research-articleOctober 2024
New Approach for Online Voting Ensuring Privacy and Verifiability
Programming and Computing Software (KLU-PACS), Volume 50, Issue Suppl 1Pages S60–S68https://doi.org/10.1134/S0361768824700427AbstractDistrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of ...
- ArticleSeptember 2024
Noise-NeRF: Hide Information in Neural Radiance Field Using Trainable Noise
Artificial Neural Networks and Machine Learning – ICANN 2024Pages 320–334https://doi.org/10.1007/978-3-031-72335-3_22AbstractNeural Radiance Field (NeRF) has been proposed as an innovative advancement in 3D reconstruction techniques. However, little research has been conducted on the issues of information confidentiality and security to NeRF, such as steganography. ...
- research-articleJuly 2024
Natural Language Steganography by ChatGPT
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 81, Pages 1–9https://doi.org/10.1145/3664476.3670930Natural language steganography as well as natural language watermarking have been challenging because of the complexity and lack of noise in natural language. But with the advent of LLMs like ChatGPT, controlled synthesis of written language has become ...
- research-articleJuly 2024
A Comprehensive Pattern-based Overview of Stegomalware
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 77, Pages 1–10https://doi.org/10.1145/3664476.3670886In recent years, malware increasingly applies steganography methods to remain undetected as long as possible. Such malware is called stegomalware. Stegomalware not only covers its tracks on the infected system, but also hides its communication with ...
- research-articleJuly 2024
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 80–95https://doi.org/10.1145/3634737.3637676An ongoing challenge in censorship circumvention is optimizing the stealthiness of communications, enabled by covert channels. Recently, a new variant called history covert channels has been proposed. Instead of modifying or mimicking legitimate data, ...
- short-paperJune 2024
A Development Framework for TCP/IP Network Steganography Malware Detection
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 95–100https://doi.org/10.1145/3658664.3659651Stegomalware poses a rising threat in the security landscape as more and more malware samples use steganography to disguise their network traffic, rendering traditional detection approaches less and less useful. To detect such advanced threats, it is ...
- research-articleJune 2024Best Student Paper
Improving Steganographic Security with Source Biasing
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 19–30https://doi.org/10.1145/3658664.3659646By selecting covers in which steganographic embedding is harder to detect, the steganographer can decrease the chances of being caught by the Warden. On the other hand, sampling from the cover source with a bias is detectable on its own. In this paper, ...
- research-articleJune 2024
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 113–124https://doi.org/10.1145/3658664.3659637Steganography describes techniques and algorithms for hiding secret information in a cover medium such as images, audio or text files. Malware that makes use of steganographic techniques, known as stegomalware, is becoming increasingly common. This paper ...
- research-articleJune 2024
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 67–78https://doi.org/10.1145/3626232.3653264State of the art generative models of human-produced content are the focus of many recent papers that explore their use for steganographic communication. In particular, generative models of natural language text. Loosely, these works (invertibly) encode ...
- research-articleMay 2024
Linguistic response surface methodology approach to measure the quality of nonlinear frame‐pixel and bit place‐based video steganography
AbstractSteganography refers to the practice of hiding sensitive information inside seemingly unrelated data sets. Steganography in the video is one of the best methods available for hiding data without compromising the film's appearance. For improved ...
- research-articleJune 2024
Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models
IVSP '24: Proceedings of the 2024 6th International Conference on Image, Video and Signal ProcessingPages 171–174https://doi.org/10.1145/3655755.3655778In today’s rapidly expanding digital landscape, safeguarding sensitive data and privacy has become imperative. Traditional security measures and authentication technologies are facing increasing challenges, particularly steganography. Steganography ...
- research-articleMarch 2024
Attacks on Machine Learning Models Based on the PyTorch Framework
Automation and Remote Control (ARCO), Volume 85, Issue 3Pages 263–271https://doi.org/10.1134/S0005117924030068AbstractThis research delves into the cybersecurity implications of neural network training in cloud-based services. Despite their recognition for solving IT problems, the resource-intensive nature of neural network training poses challenges, leading to ...
- research-articleMay 2024
Comparison of computational complexity of neural network models for detection of steganographic algorithms
ICSCA '24: Proceedings of the 2024 13th International Conference on Software and Computer ApplicationsPages 7–11https://doi.org/10.1145/3651781.3651783The purpose of the paper is to compare the computational complexity of the steganalytic method created by the authors in previously developed and presented by other academics to detect three steganographic algorithms, including jUniward, nsF5 and UERD, ...
- research-articleJanuary 2024
StegEraser: Defending cybersecurity against malicious covert communications
Journal of Computer Security (JOCS), Volume 32, Issue 2Pages 117–139https://doi.org/10.3233/JCS-220094Traditionally, the mission of intercepting malicious traffic between the Internet and the internal network of entities like organizations and corporations, is largely fulfilled by techniques such as deep packet inspection (DPI). However, steganography, ...
- research-articleJanuary 2024
slackFS - resilient and persistent information hiding framework
International Journal of Security and Networks (IJSN), Volume 19, Issue 2Pages 77–91https://doi.org/10.1504/ijsn.2024.140278The ever-expanding cyberspace, driven by digital convergence, inadvertently broadens the attack surface. Savvy modern cybercriminals have embraced steganography as a key weapon. This paper introduces slackFS, a novel steganographic framework utilising ...