Steganography

View this topic in
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. (Wikipedia.org)






Conferences related to Steganography

Back to Top

2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


2018 20th International Conference on Advanced Communication Technology (ICACT)

With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GIRI

  • 2017 19th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by

  • 2016 18th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2015 17th International Conference on Advanced Communication Technology (ICACT)

    With technically co-sponsored by IEEE ComSoc(Communications Society), IEEE ComSoc CISTC(Communications & Information Security Technical Community), and IEEE ComSoc ONTC(Optical Networking Technical Community), the ICACT(International Conference on Advanced Communications Technology) Conference has been providing an open forum for scholars, researchers, and engineers to the extensive exchange of information on newly emerging technologies, standards, services, and applications in the area of the advanced communications technology. The conference official language is English. All the presented papers have been published in the Conference Proceedings, and posted on the ICACT Website and IEEE Xplore Digital Library since 2004. The honorable ICACT Out-Standing Paper Award list has been posted on the IEEE Xplore Digital Library also, and all the Out-Standing papers are subjected to the invited paper of the "ICACT Transactions on the Advanced Communications Technology" Journal issued by GiRI.

  • 2014 16th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging system, standard, service, and variety of application on the area of telecommunications. ICACT 2014 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communication technologies.

  • 2013 15th International Conference on Advanced Communication Technology (ICACT)

    Technology, standard, service, architecture, strategy, and policy in newly emerging systems and a variety of applications in the area of communications. ICACT2013 provides an open forum for scholar, researcher, engineer, policy maker, network planner, and service provider in the advanced communications technologies.

  • 2012 14th International Conference on Advanced Communication Technology (ICACT)

    Technology, service, architecture, strategy, and policy in newly emerging systems, standards, service, and a variety of applications in the area of telecommunicatons. ICACT 2012 provides an open forum for scholars, researchers, engineers, policy makers, network planners, and service providers in the advanced communication technologies.

  • 2011 13th International Conference on Advanced Communication Technology (ICACT)

    International Conference on Advanced Communication Technology (ICACT) provides an open forum for researchers, engineers, policy, network planners, and service providers in the advanced communication technologies. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications on the area of telecommunications.

  • 2010 12th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2009 11th International Conference on Advanced Communication Technology (ICACT)

    ICACT is an annual conference providing an open forum for researchers, engineers, network planners, and service providers in telecommunications. Extensive exchange of information will be provided on newly emerging systems, standards, services, and variety of applications in the area of telecommunications.

  • 2008 10th International Conference Advanced Communication Technology (ICACT)

  • 2007 9th International Conference Advanced Communication Technology (ICACT)

  • 2006 8th International Conference Advanced Communication Technology (ICACT)

  • 2005 7th International Conference Advanced Communication Technology (ICACT)

  • 2004 6th International Conference Advanced Communication Technology (ICACT)


2018 25th IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE Signal Processing Society, is the premier forum for the presentation of technological advances and research results in the fields of theoretical, experimental, and applied image and video processing. ICIP 2018, the 25th in the series that has been held annually since 1994, brings together leading engineers and scientists in image and video processing from around the world.


2018 26th Signal Processing and Communications Applications Conference (SIU)

The general scope of the conference ranges from signal and image processing to telecommunication, and applications of signal processing methods in biomedical and communication problems.

  • 2017 25th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing and Communication Applications (SIU) conference is the most prominent scientific meeting on signal processing in Turkey bringing together researchers working in signal processing and communication fields. Topics include but are not limited to the areas of research listed in the keywords.

  • 2016 24th Signal Processing and Communication Application Conference (SIU)

    Signal Processing Theory, Statistical Signal Processing, Nonlinear Signal Processing, Adaptive Signal Processing, Array and Multichannel Signal Processing, Signal Processing for Sensor Networks, Time-Frequency Analysis, Speech / Voice Processing and Recognition, Computer Vision, Pattern Recognition, Machine Learning for Signal Processing, Human-Machine Interaction, Brain-Computer Interaction, Signal-Image Acquisition and Generation, image Processing, video Processing, Image Printing and Presentation, Image / Video / Audio browsing and retrieval, Image / Video / Audio Watermarking, Multimedia Signal Processing, Biomedical Signal Processing and Image Processing, Bioinformatics, Biometric Signal-Image Processing and Recognition, Signal Processing for Security and Defense, Signal and Image Processing for Remote Sensing, Signal Processing Hardware, Signal Processing Education, Radar Signal Processing, Communication Theory, Communication Networks, Wireless Communications

  • 2015 23th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing Theory Statistical Signal Processing Nonlinear Signal Processing Adaptive Signal Processing Array and Multichannel Signal Processing Signal Processing for Sensor Networks Time-Frequency Analysis Speech / Voice Processing and Recognition Computer Vision Pattern Recognition Machine Learning for Signal Processing Human-Machine Interaction Brain-Computer Interaction Signal-Image Acquisition and Generation image Processing video Processing Image Printing and Presentation Image / Video / Audio browsing and retrieval Image / Video / Audio Watermarking Multimedia Signal Processing Biomedical Signal Processing and Image Processing Bioinformatics Biometric Signal-Image Processing and Recognition Signal Processing for Security and Defense Signal and Image Processing for Remote Sensing Signal Processing Hardware Signal Processing Education Radar Signal Processing Communication Theory Communication Networks Wireless Communications

  • 2014 22nd Signal Processing and Communications Applications Conference (SIU)

    SIU will be held in Trabzon, Turkey at the Karadeniz Technical University Convention and Exhibition Centre on April 23, 2014. SIU is the largest and most comprehensive technical conference focused on signal processing and its applications in Turkey. Last year there were 500 hundred participants. The conference will feature renowned speakers, tutorials, and thematic workshops. Topics include but are not limited to: Signal Procesing, Image Processing, Communication, Computer Vision, Machine Learning, Biomedical Signal Processing,

  • 2013 21st Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2012 20th Signal Processing and Communications Applications Conference (SIU)

    Conference will discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. Conference will also include invited lectures, tutorials and special sessions.

  • 2011 19th Signal Processing and Communications Applications Conference (SIU)

    Conference will bring together academia and industry professionals as well as students and researchers to present and discuss state of the art solutions and research results on existing and future DSP and telecommunication systems, applications, and related standardization activities. The Conference will also include invited lectures, tutorials and special sessions.

  • 2010 IEEE 18th Signal Processing and Communications Applications Conference (SIU)

    S1.Theory of Signal-Processing S2.Statistical Signal-Processing S3.Multimedia Signal-Processing S4.Biomedical Signal-Processing S5.Sensor Networks S6.Multirate Signal-Processing S7.Pattern Recognition S8.Computer Vision S9.Adaptive Filters S10.Image/Video/Speech Browsing, Retrieval S11.Speech/Audio Coding S12.Speech Processing S13.Human-Machine Interfaces S14.Surveillance Signal Processing S15.Bioinformatics S16.Self-Learning S17.Signal-Processing Education S18.Signal-Processing Systems S1

  • 2009 IEEE 17th Signal Processing and Communications Applications Conference (SIU)

    The scope of the conference is to cover recent topics in theory and applications of Signal Processing and Communications.

  • 2008 IEEE 16th Signal Processing and Communications Applications Conference (SIU)

    Signal Processing, Image Processing, Speech Processing, Pattern Recognition, Human Computer Interaction, Communication, Video and Speech indexing, Computer Vision, Biomedical Signal Processing

  • 2007 IEEE 15th Signal Processing and Communications Applications (SIU)

  • 2006 IEEE 14th Signal Processing and Communications Applications (SIU)

  • 2005 IEEE 13th Signal Processing and Communications Applications (SIU)

  • 2004 IEEE 12th Signal Processing and Communications Applications (SIU)


More Conferences

Periodicals related to Steganography

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


More Periodicals

Most published Xplore authors for Steganography

Back to Top

Xplore Articles related to Steganography

Back to Top

Neural network based steganalysis in still images

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Sci., Harbin Inst. of Technol., China', u'full_name': u'Liu Shaohui'}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. Sci., Harbin Inst. of Technol., China', u'full_name': u'Yao Hongxun'}, {u'author_order': 3, u'full_name': u'Gao Wen'}] Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on, None

Seganalysis has recently attracted researchers' interests with the development of information hiding techniques. In this paper we propose a new method based neural network to get statistics features of images to identify the underlying hidden data. We first extract features of image embedded information, then input them into neural network to get output. And experiment results indicate this method is ...


Adaptive steganography method based on contourlet transform

[{u'author_order': 1, u'affiliation': u'Sharif University of Technology, Iran', u'full_name': u'Hedieh Sajedi'}, {u'author_order': 2, u'affiliation': u'Sharif University of Technology, Iran', u'full_name': u'Mansour Jamzad'}] 2008 9th International Conference on Signal Processing, None

In this paper, a new adaptive steganographic scheme based on contourlet transform is presented that provides large embedding capacity. In this method, embedding is done in contourlet transform domain. The contourlet coefficients with larger magnitude that correspond to the edges are selected for embedding. This selection is due to less sensitivity of human eyes to non-smooth regions. Each bit of ...


Improving embedding efficiency via matrix embedding: A case study

[{u'author_order': 1, u'affiliation': u'Institute of Computer Science and Technology, Peking University, Beijing 100871, China', u'full_name': u'Yunkai Gao'}, {u'author_order': 2, u'affiliation': u'Institute of Computer Science and Technology, Peking University, Beijing 100871, China', u'full_name': u'Xiaolong Li'}, {u'author_order': 3, u'affiliation': u'Department of Mathematics, Hong Kong Baptist University, Kowloon Tong, Hong Kong', u'full_name': u'Tieyong Zeng'}, {u'author_order': 4, u'affiliation': u'Institute of Computer Science and Technology, Peking University, Beijing 100871, China', u'full_name': u'Bin Yang'}] 2009 16th IEEE International Conference on Image Processing (ICIP), None

Matrix embedding is proved an effective way to improve embedding efficiency of steganography, and usually, higher dimensional matrix will provide better embedding efficiency. However, the sender might suffer huge computational complexity when employing high dimensional matrix. In this paper, a variation of matrix embedding is proposed. Instead of finding a coset leader as the modification of the cover image (which ...


Message Encryption Scheme Using Cheating Text

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. Sci. & Syst. Eng., Andhra Univ. Visakhapatnam, Visakhapatnam', u'full_name': u'Ch. Rupa'}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. Sci. & Syst. Eng., Andhra Univ. Visakhapatnam, Visakhapatnam', u'full_name': u'P. S. Avadhani'}] 2009 Sixth International Conference on Information Technology: New Generations, None

In this paper a new message encryption scheme using a concept called cheating text is proposed. The original message is embedded in a meaningful text called cheating text. The positions of the characters of the plain text in the cheating text are stored as real message index file (RIF). This file is encrypted and sent along with the cheating text. ...


Steganalysis by Subtractive Pixel Adjacency Matrix

[{u'author_order': 1, u'affiliation': u'FEE, Department of Cybernetics, Agent Technology Center, Czech Technical University in Prague', u'full_name': u'Tom\xe1\u0161 Pevny'}, {u'author_order': 2, u'affiliation': u'INPG¿Gipsa-Lab, Ecole Centrale de Lille, Gipsa-lab, Lagis, Grenoble, FranceFrance', u'full_name': u'Patrick Bas'}, {u'author_order': 3, u'affiliation': u'Department of Electrical and Computer Engineering, Binghamton University, NY, USA', u'full_name': u'Jessica Fridrich'}] IEEE Transactions on Information Forensics and Security, 2010

This paper presents a method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching. First, arguments are provided for modeling the differences between adjacent pixels using first-order and second-order Markov chains. Subsets of sample transition probability matrices are then used as ...


More Xplore Articles

Educational Resources on Steganography

Back to Top

eLearning

No eLearning Articles are currently tagged "Steganography"

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Steganography"

IEEE-USA E-Books

  • Network Steganography

    Network steganography techniques use overt network traffic as a carrier for the secret data. Network steganography techniques can be classified into storage and timing methods based on how the secret data are encoded into the carrier. This chapter introduces various information hiding methods based on the modification of protocol fields or the timing of protocol messages, as well as hybrid approaches such as lost audio steganography (LACK) and retransmission steganography (RSTEG) that combine the modification of protocol fields and protocol message timing to signal hidden information. It discusses techniques that encode hidden information in the timing of protocol messages, also referred to as timing covert channels. Timing channels are always noisy because of the timing inaccuracies at the covert sender and receiver. The intentional retransmissions caused by RSTEG should be kept at a reasonable level to avoid detection.

  • Network Steganography Countermeasures

    This chapter discusses the countermeasures available against network steganography. This includes measures that target a control protocol and it also includes measures against watermarking, a specific application of network steganography. Countermeasures can be active or passive techniques, or a combination of both. How to deal with network steganography greatly depends on the security requirements of organizations and government policies, the applications for which the covert channels are used, and the countermeasures available in practice. A number of channels created using storage methods can be eliminated by traffic normalization. Storage methods that cannot be eliminated and most timing methods can be countered by limiting the capacity of the covert channel. Machine learning methods have been shown to be very effective to detect covert channels-both storage and timing methods. Many covert channels use control protocols, which can also be exploited to eliminate, limit, or detect the covert channel.

  • Control Protocols for Reliable Network Steganography

    This chapter deals with control protocols that serve as enablers for feature- rich network steganography. Before defining a steganographic control protocol, it is needed to understand the idea of a communication protocol. This chapter discusses existing control protocols for network information hiding. When designing a control protocol for a covert storage channel, methods available from the area of protocol engineering can be applied to design, verify, and test the protocol. In addition to the development of covert channel-internal control protocols, other major ways to improve the resilience of covert communications are autonomous or adaptive covert channels. Adaptive control channels can bypass administrative changes or restrictions in networks by observing the network environment in which they operate. Timing channels can utilize coding techniques to signal hidden information so that a reliable data transfer can be achieved. Attacks on control protocols are also feasible.

  • Steganography and Steganalysis

    This chapter contains sections titled: * Cryptography versus Steganography * Steganography * Steganalysis * Summary and Notes

  • Image Steganography

  • Hashing and the Secure Distribution of Digital Media

    This chapter contains sections titled: Overview Intellectual Property (Copyrights and Patents) Steganography Boil, Boil, Toil … and But First, Carefully Mix Software Distribution Systems Watermarks An Image‐Processing Technique for Watermarking Using Geometric Hashing to Watermark Images Biometrics and Hashing The Dongle Appendix 19: Reed‐Solomon and Hadamard Coding

  • Background Concepts, Definitions, and Classification

    This chapter discusses information concealment possibilities in communication networks, dividing potential methods into those that hide the communicating parties' identities, those that hide the communication process and those that hide the data exchanged. It focuses on techniques that enable covert communication, that is, network steganography and traffic type obfuscation. The main difference between these two is how the overt communication is treated. In network steganography, the overt traffic is modified very slightly but in traffic type obfuscation the overt traffic is completely altered. Traffic type obfuscation hides the nature of network traffic flows by obfuscating the underlying network protocol. For both of these subdisciplines of information hiding, the chapter characterizes their main effectiveness features, communication models, and typical usage scenarios. Finally, it discusses the countermeasures. Countermeasures against traffic type obfuscation can be classified into three categories, namely content-based countermeasures, pattern-based countermeasures and protocol-based countermeasures.

  • Traffic Type Obfuscation

    Traffic type obfuscation (TTO) is hiding the type of network traffic, that is, the underlying network protocol, exchanged between two (or multiple) endpoints. In order to be effective, a typical traffic type obfuscation scheme may need to modify one or several of the traffic features which includes content of traffic, such as Internet Protocol (IP) packet content; patterns of traffic, such as IP packet timings and sizes; and protocol behavior, such as reaction to network perturbations. Traffic type obfuscation is an increasingly important type of information hiding in communication networks. In contrast to network steganography, traffic type obfuscation hides the type of the network traffic exchanged between network entities, that is, the underlying network protocols. Traffic type obfuscation techniques do this by modifying contents of traffic, patterns of traffic, or the behavior of network protocols. They are utilized mainly for blocking resistance and privacy protection.

  • Examples of Information Hiding Methods for Popular Internet Services

    This chapter provides some examples of current information hiding techniques for communication protocols of popular Internet applications and services. The high complexity of many application protocols means there are many opportunities for embedding covert channels, the steganographic bandwidth is often higher than for channels at a lower layer, and channels at application layer can exploit the properties of the whole underlying protocol stack, such as reliable data transport. The chapter shows how data can be hidden in popular P2P services, namely Skype and BitTorrent, and how steganography can be realized for mobile devices, such as smartphones by exploiting services like Siri. It explores information hiding in new network protocols and in Wi- Fi networks. The chapter discusses covert channels in online multiplayer games, specifically first person shooter games. It describes the methods to transfer covert information over online social networks and the exploitation of the Internet of Things for steganographic purposes.

  • Closing Remarks

    This chapter raises some significant questions, which are related to the future relevance of network information hiding methods, how they will be potentially used by society, and how society will be able to protect itself against them. Modern information hiding employs various embedding techniques, but a lot of these are the result of the transfer of some previously known method into the digital domain. An interesting exception to this notion is information hiding techniques in communication networks, a family of methods that emerged with the popularization of computer network environments. This type of data hiding can be treated as evolutionary step in the development of information hiding techniques. The growing number of communication protocols, services, and computing environments offers almost unlimited opportunities for applying a whole spectrum of steganographic methods. Hiding methods are used to enhance the stealthiness of malware. Network steganography techniques mostly provide security by obscurity.



Standards related to Steganography

Back to Top

No standards are currently tagged "Steganography"


Jobs related to Steganography

Back to Top