scholarly journals Geolocation of covert communication entity on the Internet for post-steganalysis

2020 ◽  
Vol 2020 (1) ◽  
Author(s):  
Fan Zhang ◽  
Fenlin Liu ◽  
Xiangyang Luo
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 90574-90584 ◽  
Author(s):  
Ruohan Meng ◽  
Qi Cui ◽  
Zhili Zhou ◽  
Zhangjie Fu ◽  
Xingming Sun

Author(s):  
S. T. Veena ◽  
A. Selvaraj

<p>Today many steganographic software tools are freely available on the Internet, which helps even callow users to have covert communication through digital images. Targeted structural image steganalysers identify only a particular steganographic software tool by tracing the unique fingerprint left in the stego images by the steganographic process. Image steganalysis proves to be a tough challenging task if the process is blind and universal, the secret payload is very less and the cover image is in lossless compression format. A payload independent universal steganalyser which identifies the steganographic software tools by exploiting the traces of artefacts left in the image and in its metadata for five different image formats is proposed. First, the artefacts in image metadata are identified and clustered to form distinct groups by extended K-means clustering. The group that is identical to the cover is further processed by extracting the artefacts in the image data. This is done by developing a signature of the steganographic software tool from its stego images. They are then matched for steganographic software tool identification. Thus, the steganalyser successfully identifies the stego images in five different image formats, out of which four are lossless, even for a payload of 1 byte. Its performance is also compared with the existing steganalyser software tool.</p>


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2001 ◽  
Vol 120 (5) ◽  
pp. A735-A735
Author(s):  
C STREETS ◽  
J PETERS ◽  
D BRUCE ◽  
P TSAI ◽  
N BALAJI ◽  
...  

1996 ◽  
Vol 16 (4) ◽  
pp. 244-245 ◽  
Author(s):  
L. Smessaert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document