The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The growth of the Internet and online social media, especially in recent years, also gave rise to a proliferation of online multimedia content creation and distribution. The use of modern steganography methods - the art of hiding information within multimedia - presents an unprecedented opportunity for malicious uses of these materials. Therefore, developing an effective technique to avoid the distribution...
In this paper, we present and investigate a method to attack and remove multimedia steganography in digital audio data. Among the existing steganography methods that can be used to hide secret data in digital audio carriers, the Spread Spectrum methods are among the most effective and robust for embedding steganography data. Though there are currently a few research efforts on removing or destroying...
In this paper, we introduce a novel algorithm to destroy the steganographic information embedded in an image without changing the quality of the image and with no prior knowledge of the used steganography scheme. We propose the new Neighbor Class Displacement (NCD) algorithm, which arranges the pixels of an image into a given number of classes. The elements of two specific classes are substituted...
Watermarking is one of the most effective tools to countering multimedia content tampering and digital piracy. However, due to widespread availability of watermarking tools and the ease of distribution via Internet, the misuse of watermarking algorithms adapted to distribute malicious information as well as industrial and government secrets is not only possible but prevalent. Therefore, it becomes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.