2018
DOI: 10.48084/etasr.2334
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of an Optimized Steganography Technique over TCP/IP and Tests Against Well-Known Security Equipment

Abstract: Nowadays we are witnessing a total convergence towards a digital world where information is digitized, conveyed and processed using highly developed techniques and tools. The development of broadband networks, including the internet, has made easy the manipulation, transmission and sharing of information. However, new security issues arise and they are particularly related to integrity, confidentiality and traceability of data. Facing this situation, network security has become very important and challenges re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…Steganography can be utilized to securely transmit and store data and can have other applications, such as content authentication, copyright protection, and data integrity assurance [3]. Various data-hiding methods have been explored and several valuable steganographic methods have been proposed to improve security and protect data against unauthorized access [4,5]. In information-hiding mechanisms, the three quality parameters considered are robustness, capacity, and imperceptibility [6].…”
Section: Introductionmentioning
confidence: 99%
“…Steganography can be utilized to securely transmit and store data and can have other applications, such as content authentication, copyright protection, and data integrity assurance [3]. Various data-hiding methods have been explored and several valuable steganographic methods have been proposed to improve security and protect data against unauthorized access [4,5]. In information-hiding mechanisms, the three quality parameters considered are robustness, capacity, and imperceptibility [6].…”
Section: Introductionmentioning
confidence: 99%