View this topic in
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. (

Conferences related to Steganography

Back to Top

2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.

ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.

ICC 2019 - 2019 IEEE International Conference on Communications (ICC)

The 2019 IEEE International Conference on Communications (ICC) will be held from 20-24 May 2019 at Shanghai International Convention Center, China,conveniently located in the East Coast of China, the region home to many of the world’s largest ICT industries and research labs. Themed“Smart Communications”, this flagship conference of IEEE Communications Society will feature a comprehensive Technical Program including16 Symposia and a number of Tutorials and Workshops. IEEE ICC 2019 will also include an attractive Industry Forum & Exhibition Program featuringkeynote speakers, business and industry pan

2018 14th IEEE International Conference on Signal Processing (ICSP)

ICSP2018 includes sessions on all aspects of theory, design and applications of signal processing. Prospective authors are invited to propose papers in any of the following areas, but not limited to: A. Digital Signal Processing (DSP)B. Spectrum Estimation & ModelingC. TF Spectrum Analysis & WaveletD. Higher Order Spectral AnalysisE. Adaptive Filtering &SPF. Array Signal ProcessingG. Hardware Implementation for Signal ProcessingH Speech and Audio CodingI. Speech Synthesis & RecognitionJ. Image Processing & UnderstandingK. PDE for Image ProcessingL.Video compression &StreamingM. Computer Vision & VRN. Multimedia & Human-computer InteractionO. Statistic Learning & Pattern RecognitionP. AI & Neural NetworksQ. Communication Signal processingR. SP for Internet and Wireless CommunicationsS. Biometrics & AuthentificationT. SP for Bio-medical & Cognitive ScienceU

2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2018 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions

More Conferences

Periodicals related to Steganography

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...

Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...

Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes

Dependable and Secure Computing, IEEE Transactions on

The purpose of TDSC is to publish papers in dependability and security, including the joint consideration of these issues and their interplay with system performance. These areas include but are not limited to: System Design: architecture for secure and fault-tolerant systems; trusted/survivable computing; intrusion and error tolerance, detection and recovery; fault- and intrusion-tolerant middleware; firewall and network technologies; system management ...

More Periodicals

Most published Xplore authors for Steganography

Back to Top

Xplore Articles related to Steganography

Back to Top

A spread spectrum spatial steganographic processor core for textual information communication over streaming videos

[{u'author_order': 1, u'affiliation': u'Alcatel Telecom, Islamabad, Pakistan', u'authorUrl': u'', u'full_name': u'F. Sattar', u'id': 38259155600}, {u'author_order': 2, u'authorUrl': u'', u'full_name': u'A.K. Khan', u'id': 38256731800}, {u'author_order': 3, u'authorUrl': u'', u'full_name': u'H. Jamal', u'id': 37284215200}] 7th International Multi Topic Conference, 2003. INMIC 2003., 2003

This work presents an architectural framework for concealing a message of substantial length within uncompressed streaming digital video using formalism of spread spectrum communication, symmetric ciphering and error control coding. The design effort is concentrated on achieving high levels of imperceptibility, security of the payload and its error free recovery without compromising on the overall performance.

A simple technique for estimating message lengths for additive noise steganography

[{u'author_order': 1, u'affiliation': u'Dept. of Comput. & Information Sci., Polytech. Univ., Brooklyn, NY, USA', u'authorUrl': u'', u'full_name': u'Ming Jiang', u'id': 37287359500}, {u'author_order': 2, u'affiliation': u'Dept. of Comput. & Information Sci., Polytech. Univ., Brooklyn, NY, USA', u'authorUrl': u'', u'full_name': u'E. Wong', u'id': 37346851300}, {u'author_order': 3, u'affiliation': u'Dept. of Comput. & Information Sci., Polytech. Univ., Brooklyn, NY, USA', u'authorUrl': u'', u'full_name': u'N. Memon', u'id': 37283984000}, {u'author_order': 4, u'authorUrl': u'', u'full_name': u'Xiaolin Wu', u'id': 37281235500}] ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004., 2004

We propose a practical steganalysis method to detect hidden information and estimate embedding rate. By modelling steganographic embedding as an additive noise process, we exploit the fact that the mean and variance of stegosignal is a function of embedding rate. This can be used to estimate the embedding rate without knowledge of the original cover object. We present simulation results ...

Dynamic Steganography Adds Additional Data Security

[{u'author_order': 1, u'affiliation': u'Florida International University', u'authorUrl': u'', u'full_name': u'R. Zavaleta', u'id': 38202501700}, {u'author_order': 2, u'authorUrl': u'', u'full_name': u'S. Wunnava', u'id': 37353178900}] IEEE SoutheastCon, 2004. Proceedings., 2004

Today's data security consists of many layers. Data activity may be hidden, in addition to encryption, to make it more secure. Steganography provides a possible solution, to further enhance the data security. This paper presents the concept of basic steganography and further improvements as well as the attacks on steganography. In this article, the authors will present the investigations carried ...

A New Solution for Password Key Transferring in Steganography Methods by CAPTCHA through MMS Technology

[{u'author_order': 1, u'affiliation': u'Computer Science Department, Sharif University of Technology, Tehran, IRAN,,', u'authorUrl': u'', u'full_name': u'Mohammad Shirali-Shahreza', u'id': 38277419800}, {u'author_order': 2, u'affiliation': u'Computer Engineering Department, Yazd University, Yazd, IRAN,,', u'authorUrl': u'', u'full_name': u'M. Hassan Shirali-Shahreza', u'id': 38277419900}] 2007 International Conference on Information and Emerging Technologies, 2007

The Multimedia Messaging System (MMS) allows a user of a mobile phone to send messages containing multimedia objects, such as images, audio or video clips. On the other hand establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is ...

Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency

[{u'author_order': 1, u'authorUrl': u'', u'full_name': u'Qu Zhiguo', u'id': 37670919800}, {u'author_order': 2, u'authorUrl': u'', u'full_name': u'Fu Yu', u'id': 37675380400}, {u'author_order': 3, u'authorUrl': u'', u'full_name': u'Niu Xinxin', u'id': 37570080600}, {u'author_order': 4, u'authorUrl': u'', u'full_name': u'Yang Yixian', u'id': 37570080400}, {u'author_order': 5, u'authorUrl': u'', u'full_name': u'Zhang Ru', u'id': 37673365700}] 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009

EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding efficiency. In this paper, we describe a new novel method of steganography based on bese idea of EMD embedding, which builds up the multilevel for the secret messages and ...

More Xplore Articles

Educational Resources on Steganography

Back to Top


No eLearning Articles are currently tagged "Steganography" Videos

No Videos are currently tagged "Steganography"


  • Image Steganography

    This chapter contains sections titled: * Types of Steganography * Applications of Steganography * Embedding Security and Imperceptibility * Examples of Steganography Software * Genetic Algorithm-Based Steganography * References ]]>

  • Network Steganography

    Network steganography techniques use overt network traffic as a carrier for the secret data. Network steganography techniques can be classified into storage and timing methods based on how the secret data are encoded into the carrier. This chapter introduces various information hiding methods based on the modification of protocol fields or the timing of protocol messages, as well as hybrid approaches such as lost audio steganography (LACK) and retransmission steganography (RSTEG) that combine the modification of protocol fields and protocol message timing to signal hidden information. It discusses techniques that encode hidden information in the timing of protocol messages, also referred to as timing covert channels. Timing channels are always noisy because of the timing inaccuracies at the covert sender and receiver. The intentional retransmissions caused by RSTEG should be kept at a reasonable level to avoid detection.

  • Network Steganography Countermeasures

    This chapter discusses the countermeasures available against network steganography. This includes measures that target a control protocol and it also includes measures against watermarking, a specific application of network steganography. Countermeasures can be active or passive techniques, or a combination of both. How to deal with network steganography greatly depends on the security requirements of organizations and government policies, the applications for which the covert channels are used, and the countermeasures available in practice. A number of channels created using storage methods can be eliminated by traffic normalization. Storage methods that cannot be eliminated and most timing methods can be countered by limiting the capacity of the covert channel. Machine learning methods have been shown to be very effective to detect covert channels-both storage and timing methods. Many covert channels use control protocols, which can also be exploited to eliminate, limit, or detect the covert channel.

  • Steganography and Steganalysis

    This chapter contains sections titled: * Cryptography versus Steganography * Steganography * Steganalysis * Summary and Notes

  • Control Protocols for Reliable Network Steganography

    This chapter deals with control protocols that serve as enablers for feature- rich network steganography. Before defining a steganographic control protocol, it is needed to understand the idea of a communication protocol. This chapter discusses existing control protocols for network information hiding. When designing a control protocol for a covert storage channel, methods available from the area of protocol engineering can be applied to design, verify, and test the protocol. In addition to the development of covert channel-internal control protocols, other major ways to improve the resilience of covert communications are autonomous or adaptive covert channels. Adaptive control channels can bypass administrative changes or restrictions in networks by observing the network environment in which they operate. Timing channels can utilize coding techniques to signal hidden information so that a reliable data transfer can be achieved. Attacks on control protocols are also feasible.

Standards related to Steganography

Back to Top

No standards are currently tagged "Steganography"

Jobs related to Steganography

Back to Top