Information hiding techniques, especially steganography, have been extensively researched for over two decades. Nonetheless, steganography on smartphones over cellular carrier networks is yet to be fully explored. Today, smartphones, which are at the epitome of ubiquitous and pervasive computing, make steganography an easily accessible covert communication channel. In this paper, we propose Android-Stego - a framework for steganography employing smart-phones. Android-Stego has been evaluated and confirmed to achieve covert communication over real world cellular service providers' communication networks such as Verizon and Sprint. A key contribution of our research presented in this paper is the benchmark results we have provided by analyzin...
The continued development of technology driven by the growing digital media facilities. A digital de...
Advanced image and video processing abilities in smart phones and digital cameras make them popular ...
Abstract- Security has become major issue in all online services. Strong authentication is provided ...
Steganography is an historical technique to send secret messages embedded into carrier messages. The...
Abstract—By offering sophisticated services and centralizing a huge volume of personal data, modern ...
Facebook Messenger, ChatSecure, Line, QQ and WhatsApp represent examples of Mobile Messaging Applica...
Steganography is a well known, and long standing, technique to hide data into data. The actual small...
Abstract — The rapid development of data transfer through internet has made it easier to send the da...
In today's fast-paced world of technology, the use of smartphones or iPhones has become so widesprea...
Abstract. We discuss a class of smartphone malware that uses stegano-graphic techniques to hide mali...
With the development of mobile devices the security issue migrates from the PC platform to this new...
and Proportional fonts, which have similar figures to human vision and cannot recognized by human ey...
The study's ultimate goal is to develop an Android app dedicated to Image Steganography, a technique...
Abstract We develop and evaluate a data hiding method that enables smartphones to encrypt and embed ...
ABSTRACT: After the advancement in mobile phone industry now mobile phones are available with huge v...
The continued development of technology driven by the growing digital media facilities. A digital de...
Advanced image and video processing abilities in smart phones and digital cameras make them popular ...
Abstract- Security has become major issue in all online services. Strong authentication is provided ...
Steganography is an historical technique to send secret messages embedded into carrier messages. The...
Abstract—By offering sophisticated services and centralizing a huge volume of personal data, modern ...
Facebook Messenger, ChatSecure, Line, QQ and WhatsApp represent examples of Mobile Messaging Applica...
Steganography is a well known, and long standing, technique to hide data into data. The actual small...
Abstract — The rapid development of data transfer through internet has made it easier to send the da...
In today's fast-paced world of technology, the use of smartphones or iPhones has become so widesprea...
Abstract. We discuss a class of smartphone malware that uses stegano-graphic techniques to hide mali...
With the development of mobile devices the security issue migrates from the PC platform to this new...
and Proportional fonts, which have similar figures to human vision and cannot recognized by human ey...
The study's ultimate goal is to develop an Android app dedicated to Image Steganography, a technique...
Abstract We develop and evaluate a data hiding method that enables smartphones to encrypt and embed ...
ABSTRACT: After the advancement in mobile phone industry now mobile phones are available with huge v...
The continued development of technology driven by the growing digital media facilities. A digital de...
Advanced image and video processing abilities in smart phones and digital cameras make them popular ...
Abstract- Security has become major issue in all online services. Strong authentication is provided ...