2017 3rd International Conference on Frontiers of Signal Processing (ICFSP) 2017
DOI: 10.1109/icfsp.2017.8097145
|View full text |Cite
|
Sign up to set email alerts
|

SocialStegDisc: Application of steganography in social networks to create a file system

Abstract: Abstract-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…The idea behind this paper is to extend examination if the StegHash [6] and SocialStegDisc [7] mechanisms can be apply for communication systems for the fog in the devices. The paper [9] introduced the idea which is reminded by Section III-A.…”
Section: Reference Architecture Of Stegfog Systemmentioning
confidence: 99%
See 4 more Smart Citations
“…The idea behind this paper is to extend examination if the StegHash [6] and SocialStegDisc [7] mechanisms can be apply for communication systems for the fog in the devices. The paper [9] introduced the idea which is reminded by Section III-A.…”
Section: Reference Architecture Of Stegfog Systemmentioning
confidence: 99%
“…• StegHash/SocialStegDisc layer -the implementation of the StegHash [6] indexing method, SocialStegDisc [7] memory management and any of steganographic methods on files to hide data within the local storage [13].…”
Section: B Stegfog Layered Architecturementioning
confidence: 99%
See 3 more Smart Citations