Steganography

View this topic in
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. (Wikipedia.org)






Conferences related to Steganography

Back to Top

2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.


ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

The 2019 IEEE International Conference on Communications (ICC) will be held from 20-24 May 2019 at Shanghai International Convention Center, China,conveniently located in the East Coast of China, the region home to many of the world’s largest ICT industries and research labs. Themed“Smart Communications”, this flagship conference of IEEE Communications Society will feature a comprehensive Technical Program including16 Symposia and a number of Tutorials and Workshops. IEEE ICC 2019 will also include an attractive Industry Forum & Exhibition Program featuringkeynote speakers, business and industry pan


2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU


2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions


More Conferences

Periodicals related to Steganography

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...


More Periodicals

Most published Xplore authors for Steganography

Back to Top

Xplore Articles related to Steganography

Back to Top

A spread spectrum spatial steganographic processor core for textual information communication over streaming videos

7th International Multi Topic Conference, 2003. INMIC 2003., 2003

This work presents an architectural framework for concealing a message of substantial length within uncompressed streaming digital video using formalism of spread spectrum communication, symmetric ciphering and error control coding. The design effort is concentrated on achieving high levels of imperceptibility, security of the payload and its error free recovery without compromising on the overall performance.


A simple technique for estimating message lengths for additive noise steganography

ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004., 2004

We propose a practical steganalysis method to detect hidden information and estimate embedding rate. By modelling steganographic embedding as an additive noise process, we exploit the fact that the mean and variance of stegosignal is a function of embedding rate. This can be used to estimate the embedding rate without knowledge of the original cover object. We present simulation results ...


Dynamic Steganography Adds Additional Data Security

IEEE SoutheastCon, 2004. Proceedings., 2004

Today's data security consists of many layers. Data activity may be hidden, in addition to encryption, to make it more secure. Steganography provides a possible solution, to further enhance the data security. This paper presents the concept of basic steganography and further improvements as well as the attacks on steganography. In this article, the authors will present the investigations carried ...


A New Solution for Password Key Transferring in Steganography Methods by CAPTCHA through MMS Technology

2007 International Conference on Information and Emerging Technologies, 2007

The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is ...


Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency

2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009

EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding efficiency. In this paper, we describe a new novel method of steganography based on bese idea of EMD embedding, which builds up the multilevel for the secret messages and ...


More Xplore Articles

Educational Resources on Steganography

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Steganography"

IEEE-USA E-Books

  • A spread spectrum spatial steganographic processor core for textual information communication over streaming videos

    This work presents an architectural framework for concealing a message of substantial length within uncompressed streaming digital video using formalism of spread spectrum communication, symmetric ciphering and error control coding. The design effort is concentrated on achieving high levels of imperceptibility, security of the payload and its error free recovery without compromising on the overall performance.

  • A simple technique for estimating message lengths for additive noise steganography

    We propose a practical steganalysis method to detect hidden information and estimate embedding rate. By modelling steganographic embedding as an additive noise process, we exploit the fact that the mean and variance of stegosignal is a function of embedding rate. This can be used to estimate the embedding rate without knowledge of the original cover object. We present simulation results to demonstrate that the proposed method can estimate embedding rate with reasonable accuracy. The technique we propose is general and can be used for steganalysis of images, video, and audio etc.

  • Dynamic Steganography Adds Additional Data Security

    Today's data security consists of many layers. Data activity may be hidden, in addition to encryption, to make it more secure. Steganography provides a possible solution, to further enhance the data security. This paper presents the concept of basic steganography and further improvements as well as the attacks on steganography. In this article, the authors will present the investigations carried out using the stegano principles, to enhance the data security and data integrity.

  • A New Solution for Password Key Transferring in Steganography Methods by CAPTCHA through MMS Technology

    The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Therefore steganography in MMS is an interesting idea. One of the problems in steganography methods is the security of transferring password key used for steganography between sender and receiver of secure data. In this paper a new method is proposed for solving this problem using CAPTCHA method through MMS messages. In this method the password key is spoken in an audio file and the data are hidden in the image by this password key. Then the image and audio files are inserted in a MMS message and sent to the receiver. Therefore the human receiver can recognize the password from the audio file and extract the data from the image using this password, but the computer cannot recognize the spoken word from the audio file and extracting the password. By this method the user does not need to memorize any password for extracting the data. This method has been implemented in J2ME programming language.

  • Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency

    EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding efficiency. In this paper, we describe a new novel method of steganography based on bese idea of EMD embedding, which builds up the multilevel for the secret messages and decreases the redundancy of the host image's transparency for better embedding rate. In order to obtain better transparency of images and conveniency of algorithm, embedding modification does not happen on LSB of the pixels but frequency coefficients in new improved EMD method. The results of experiments show that the proposed method has better performances on the embedding efficiency and the embedding rate than the EMD steganography.

  • A Secure BPCS Steganography against Statistical Analysis

    Statistical analysis based on complexity histogram is a powerful steganalytic technique for detecting the presence of secret message embedded in the digital images using bit-plane complexity segmentation (BPCS). This paper proposes an improved BPCS algorithm that can effectively resist statistical analysis. We set different threshold values at different bit planes, combining complexity with the characteristics of human visual system whereby a human is less sensitive to the regions with higher or lower gray values, to select blocks for embedding. Experimental results show that adopting the improved algorithm can effectively resist statistical analysis based on the complexity histogram, and the stego-image has better quality than BPCS-steganography

  • An Image Steganography Systems Based on BPCS and IWT

    In this paper, an image steganography system is proposed, in which the data hiding (embedding) is realized in bit planes of subband wavelets coefficients obtained by using the Integer Wavelet Transform (IWT). To increase data hiding capacity while keeping the imperceptibility of the hidden data, the replaceable IWT coefficient areas are defined by a complexity measure used in the Bit-Plane Complexity Segmentation Steganography (BPCS). The proposed system shows a high data hiding capacity (more than 2 bpp in many case), while keeping a high fidelity of stegoimage (more than 35 dB of PSNR). To make the proposed system robust enough to some distortion caused by non-ideal communication channel, we introduce an Error Control Coding to the system, which can reduce the Bit Error Rate (BER) of extracted hidden data when the stegoimage receive some channel distortion.

  • SINR, bit error rate, and Shannon capacity optimized spread-spectrum steganography

    For any given host image and (block) transform domain of interest, we derive the signature vector that when used for spread-spectrum (SS) message embedding that maximizes the signal-to-interference-plus-noise ratio (SINR) at the output of the maximum SINR linear filter receiver. Under a (colored) Gaussian assumption on the transform domain host data, we see that the same signature offers minimum probability of error message recovery at any host distortion level or -conversely- minimizes the host distortion for any probability of error target level. In addition, we show that the same signature maximizes the Shannon capacity of the covert link. All developments are then generalized to cover SS embedding in linearly processed block transform domain host data with orders of magnitude demonstrated improvement over current SS steganographic practices.

  • On information hiding with incomplete information about steganalysis

    Suppose the information hider has a set of information hiding schemes to be employed in the presence of a set of steganalysis detectors. Let the information hider have only an incomplete information about the steganalysis detectors. That is, suppose the probability of the jth steganalysis detector would be used is p/sub j/, j = 1,2...n, then the information hider only knows the ordering of these probabilities, say, p/sub 1//spl ges/p/sub 2//spl ges/...p/sub n/. Under this circumstance how can the information hider choose the optimal embedding strategy? This is the question addressed in this paper. Theoretical analysis and some numerical results are presented.

  • Using the Chaotic Map in Image Steganography

    Recent years have seen more interest from researchers in image encryption using chaotic signals. A new method was proposed for image steganography in this article in which two chaotic signals for specifying the location of the different parts of the message in the picture. An 80-bit key was used to reach the preliminary measures of the two chaotic signals. One of the advantages of this method is its security which is caused by the chaotic signals and the higher range of the PSNR (42.06).



Standards related to Steganography

Back to Top

No standards are currently tagged "Steganography"


Jobs related to Steganography

Back to Top