Volume 16 (2024)
Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain

Omid Torki; Maede Ashouri-Talouki; Mojtaba Mahdavi

Volume 15, Issue 1 , January 2023, , Pages 73-81

https://doi.org/10.22042/isecure.2022.319074.729

Abstract
  Steganography is a solution for covert communication and blockchain is a p2p network for data transmission, so the benefits of blockchain can be used in steganography. In this paper, we discuss the advantages of blockchain in steganography, which include the ability to embed hidden data without manual ...  Read More

Optimizing image steganography by combining the GA and ICA

F. Sadeghi; F. Zarisfi Kermani; M. Kuchaki Rafsanjani

Volume 7, Issue 1 , January 2015, , Pages 47-58

https://doi.org/10.22042/isecure.2015.7.1.5

Abstract
  In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded ...  Read More

Detection of perturbed quantization (PQ) steganography based on empirical matrix

M. Abolghasemi; H. Aghaeinia; K. Faez

Volume 2, Issue 2 , July 2010, , Pages 119-128

https://doi.org/10.22042/isecure.2015.2.2.5

Abstract
  Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower ...  Read More

Steganalysis of embedding in difference of image pixel pairs by neural network

V. Sabeti; Sh. Samavi; M. Mahdavi; Sh. Shirani

Volume 1, Issue 1 , January 2009, , Pages 17-26

https://doi.org/10.22042/isecure.2015.1.1.3

Abstract
  In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image ...  Read More