Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Pulsar: Secure Steganography for Diffusion Models
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 4703–4717https://doi.org/10.1145/3658644.3690218Widespread efforts to subvert access to strong cryptography has renewed interest in steganography, the practice of embedding sensitive messages in mundane cover messages. Recent efforts at provably secure steganography have focused on text-based ...
- research-articleOctober 2024
From Covert Hiding To Visual Editing: Robust Generative Video Steganography
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 2757–2765https://doi.org/10.1145/3664647.3681149Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process. Although ...
- short-paperOctober 2024
Practical Deep Learning Models for QIM-based VoIP Steganalysis
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 11132–11136https://doi.org/10.1145/3664647.3685646Quantization index modulation (QIM) based VoIP steganography can conceal secret information in VoIP streams. Malicious users could use this technology to conduct illegal activities, threatening network and public security. Hence, practical steganalysis ...
- research-articleNovember 2024
New Approach for Online Voting Ensuring Privacy and Verifiability
Programming and Computing Software (KLU-PACS), Volume 50, Issue Suppl 1Pages S60–S68https://doi.org/10.1134/S0361768824700427AbstractDistrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of ...
-
- ArticleSeptember 2024
Noise-NeRF: Hide Information in Neural Radiance Field Using Trainable Noise
Artificial Neural Networks and Machine Learning – ICANN 2024Pages 320–334https://doi.org/10.1007/978-3-031-72335-3_22AbstractNeural Radiance Field (NeRF) has been proposed as an innovative advancement in 3D reconstruction techniques. However, little research has been conducted on the issues of information confidentiality and security to NeRF, such as steganography. ...
- research-articleJuly 2024
Natural Language Steganography by ChatGPT
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 81, Pages 1–9https://doi.org/10.1145/3664476.3670930Natural language steganography as well as natural language watermarking have been challenging because of the complexity and lack of noise in natural language. But with the advent of LLMs like ChatGPT, controlled synthesis of written language has become ...
- research-articleJuly 2024
A Comprehensive Pattern-based Overview of Stegomalware
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 77, Pages 1–10https://doi.org/10.1145/3664476.3670886In recent years, malware increasingly applies steganography methods to remain undetected as long as possible. Such malware is called stegomalware. Stegomalware not only covers its tracks on the infected system, but also hides its communication with ...
- research-articleJuly 2024
Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 80–95https://doi.org/10.1145/3634737.3637676An ongoing challenge in censorship circumvention is optimizing the stealthiness of communications, enabled by covert channels. Recently, a new variant called history covert channels has been proposed. Instead of modifying or mimicking legitimate data, ...
- short-paperJune 2024
A Development Framework for TCP/IP Network Steganography Malware Detection
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 95–100https://doi.org/10.1145/3658664.3659651Stegomalware poses a rising threat in the security landscape as more and more malware samples use steganography to disguise their network traffic, rendering traditional detection approaches less and less useful. To detect such advanced threats, it is ...
- research-articleJune 2024Best Student Paper
Improving Steganographic Security with Source Biasing
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 19–30https://doi.org/10.1145/3658664.3659646By selecting covers in which steganographic embedding is harder to detect, the steganographer can decrease the chances of being caught by the Warden. On the other hand, sampling from the cover source with a bias is detectable on its own. In this paper, ...
- research-articleJune 2024
Text Steganography Methods and their Influence in Malware: A Comprehensive Overview and Evaluation
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 113–124https://doi.org/10.1145/3658664.3659637Steganography describes techniques and algorithms for hiding secret information in a cover medium such as images, audio or text files. Malware that makes use of steganographic techniques, known as stegomalware, is becoming increasingly common. This paper ...
- research-articleJune 2024
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 67–78https://doi.org/10.1145/3626232.3653264State of the art generative models of human-produced content are the focus of many recent papers that explore their use for steganographic communication. In particular, generative models of natural language text. Loosely, these works (invertibly) encode ...
- research-articleJune 2024
Joint Steganography and Encryption Techniques for Security Enhancement Using Deep Learning Models
IVSP '24: Proceedings of the 2024 6th International Conference on Image, Video and Signal ProcessingPages 171–174https://doi.org/10.1145/3655755.3655778In today’s rapidly expanding digital landscape, safeguarding sensitive data and privacy has become imperative. Traditional security measures and authentication technologies are facing increasing challenges, particularly steganography. Steganography ...
- research-articleAugust 2024
Attacks on Machine Learning Models Based on the PyTorch Framework
Automation and Remote Control (ARCO), Volume 85, Issue 3Pages 263–271https://doi.org/10.1134/S0005117924030068AbstractThis research delves into the cybersecurity implications of neural network training in cloud-based services. Despite their recognition for solving IT problems, the resource-intensive nature of neural network training poses challenges, leading to ...
- research-articleMay 2024
Comparison of computational complexity of neural network models for detection of steganographic algorithms
ICSCA '24: Proceedings of the 2024 13th International Conference on Software and Computer ApplicationsPages 7–11https://doi.org/10.1145/3651781.3651783The purpose of the paper is to compare the computational complexity of the steganalytic method created by the authors in previously developed and presented by other academics to detect three steganographic algorithms, including jUniward, nsF5 and UERD, ...
- research-articleSeptember 2024
Robust and secure file transmission through video streaming using steganography and blockchain
International Journal of Information and Computer Security (IJICS), Volume 24, Issue 3-4Pages 258–283https://doi.org/10.1504/ijics.2024.141610File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ...
- research-articleSeptember 2024
Secure digital academic certificate verification system using blockchain
International Journal of Information and Computer Security (IJICS), Volume 24, Issue 3-4Pages 236–257https://doi.org/10.1504/ijics.2024.141600At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, ...
- research-articleSeptember 2024
An improved continuous and discrete Harris Hawks optimiser applied to feature selection for image steganalysis
International Journal of Computational Science and Engineering (IJCSE), Volume 27, Issue 5Pages 515–535https://doi.org/10.1504/ijcse.2024.141339To attack advanced steganography, high-dimensional rich feature set such as spatial rich model (SRM) (34671-dimensional) is extracted for image steganalysis. To address the dimensionality curse, researchers utilised feature selection techniques and ...
- research-articleNovember 2024
Adaptive highly secure and imperceptible video steganography for medical images via deep convolutional neural network
International Journal of Information and Computer Security (IJICS), Volume 25, Issue 1-2Pages 78–95https://doi.org/10.1504/ijics.2024.142702The risk of medical data theft has increased due to technological developments in communication. Steganography is frequently used for covert communication; however, existing steganography algorithms have poor imperceptibility, lesser embedding capacity, ...