International audienceWe consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a `suspicion-free' digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the calar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stegosystem following the ideas of R. Anderson and P. Petitcolas. This te...
A network covert channel is a passage along which information leaks across the network in violation ...
International audienceIn this paper, a novel steganographic scheme based on chaotic iterations is pr...
Steganography is the science of writing hidden messages. In this context, an individual attempts to ...
International audienceWe consider the problem of hiding information in a steganographic framework, i...
International audienceIn this research work, security concepts are formalized in steganography, and ...
The rapid growth of multimedia transmission leads to lose the owner identity of their products. The...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
This paper considers steganography - the concept of hiding the presence of secret messages in legal ...
Steganography, the art and science of carrying out hidden communication, is an emergingsub-disciplin...
Audio Steganography is a technique used to transmit hidden records by means of editing an audio sign...
In this paper we analyze and test several steganographic techniques on still images. We show that ...
AbstractAn information-theoretic model for steganography with a passive adversary is proposed. The a...
Steganography is a part of hiding information in a host signal. The goal of steganographic systems i...
In the time when the explosion of electronic and digital technologies happened, communication techno...
The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the abilit...
A network covert channel is a passage along which information leaks across the network in violation ...
International audienceIn this paper, a novel steganographic scheme based on chaotic iterations is pr...
Steganography is the science of writing hidden messages. In this context, an individual attempts to ...
International audienceWe consider the problem of hiding information in a steganographic framework, i...
International audienceIn this research work, security concepts are formalized in steganography, and ...
The rapid growth of multimedia transmission leads to lose the owner identity of their products. The...
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-re...
This paper considers steganography - the concept of hiding the presence of secret messages in legal ...
Steganography, the art and science of carrying out hidden communication, is an emergingsub-disciplin...
Audio Steganography is a technique used to transmit hidden records by means of editing an audio sign...
In this paper we analyze and test several steganographic techniques on still images. We show that ...
AbstractAn information-theoretic model for steganography with a passive adversary is proposed. The a...
Steganography is a part of hiding information in a host signal. The goal of steganographic systems i...
In the time when the explosion of electronic and digital technologies happened, communication techno...
The paper presents the analysis of the Commercial Off-The-Shelf (COTS) software regarding the abilit...
A network covert channel is a passage along which information leaks across the network in violation ...
International audienceIn this paper, a novel steganographic scheme based on chaotic iterations is pr...
Steganography is the science of writing hidden messages. In this context, an individual attempts to ...