2016 6th International Conference on Computers Communications and Control (ICCCC) 2016
DOI: 10.1109/icccc.2016.7496734
|View full text |Cite
|
Sign up to set email alerts
|

Testing methods for the efficiency of modern steganography solutions for mobile platforms

Abstract: Cryptography and Steganography are two commonly used techniques in modern era for ensuring confidential and private communication. These techniques complete each other offering multiple layers of safety, enhancing digital information security. In this paper we analyze Smartsteg, which is a project that implements cryptography combined with steganography on mobile devices that run Android and Windows. We evaluate the performance of this project in terms of: interoperability, security, payload capacity, speed an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Next, we performed a network analysis (Jasp software, Amsterdam, The Netherlands) of the 16 items to deeper understand the relationship between them and to verify the structure of the 5 presumed factors (Figure 2 and Table 2), from a behavioral economics perspective. Behavioral economics blends economics and psychology to better understand how and why individuals act as they do in the real world [92,93]. Recent empirical and theoretical assessments of social networks were reviewed, with an emphasis on how social networks affected economic behavior and how social networks arose.…”
Section: Measurementmentioning
confidence: 99%
“…Next, we performed a network analysis (Jasp software, Amsterdam, The Netherlands) of the 16 items to deeper understand the relationship between them and to verify the structure of the 5 presumed factors (Figure 2 and Table 2), from a behavioral economics perspective. Behavioral economics blends economics and psychology to better understand how and why individuals act as they do in the real world [92,93]. Recent empirical and theoretical assessments of social networks were reviewed, with an emphasis on how social networks affected economic behavior and how social networks arose.…”
Section: Measurementmentioning
confidence: 99%
“…As mentioned in [30], secret media are decomposed into HH, LL, LH, and HL to set the following coefficient values.…”
Section: Transform Domainmentioning
confidence: 99%
“…Any truncation in this coefficient may destroy the embedded information according to Arunkumar et al [31]. Xiong et al [30] adopt an integer wavelet transform to overcome the floating-point problem, which can map an integer input to integer output to prevent the floating-point of wavelet filters. The IWT LL sub-band is similar to the original image to the DWT LL [32][33] [34].…”
Section: Transform Domainmentioning
confidence: 99%
“…He has proposed his idea for embedding data in emoticons or using lingoes in SMS than the recipient can extract the hidden information. In [19] we find the information regarding different steganographic techniques and gives performance metrics for mobile image steganography. In [20], creators have built up an android application through which we can shroud information behind the picture, and we can share an apk document through WhatsApp.…”
Section: Literature Reviewmentioning
confidence: 99%