A course in number theory and cryptography
A course in number theory and cryptography
Cryptologia
Two-level grammars are more expressive than Type 0 grammars: or are they?
ACM SIGPLAN Notices
IBM Systems Journal
Hiding the Hidden: A software system for concealing ciphertext as innocuous text
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Proceedings of the First International Workshop on Information Hiding
Investigator's Guide to Steganography
Investigator's Guide to Steganography
Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Proceedings of the 2006 ACM symposium on Applied computing
A New Approach to Persian/Arabic Text Steganography
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
Translation-based steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Is image steganography natural?
IEEE Transactions on Image Processing
Nostega: A Novel Noiseless Steganography Paradigm
Journal of Digital Forensic Practice
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
Headstega: e-mail-headers-based steganography methodology
International Journal of Electronic Security and Digital Forensics
Sumstega: summarisation-based steganography methodology
International Journal of Information and Computer Security
Edustega: an Education-Centric Steganography methodology
International Journal of Security and Networks
Jokestega: automatic joke generation-based steganography methodology
International Journal of Security and Networks
Hi-index | 0.00 |
The Graph Steganography Methodology (Graphstega) is the art and science of avoiding the arousal of suspicion in covert communications by concealing a message in a graph-cover. Unlike other approaches, Graphstega does not embed a message as a noise in a cover. Instead the message is camouflaged as plotted data. Graphstega is keyless and the hidden message is anti-distortion. The popular usage of graphs in business, education, news, etc. and the availability of tremendous amount of graphs in electronic and non-electronic format make the investigation and detection of a hidden message extremely difficult. In addition, Graphstega is resilient to contemporary attacks, such as traffic analysis, contrast, and comparison attack, even when launched by an adversary who is familiar with Graphstega.