Transmission of Secret Information Based on Time Instances
Abstract
Keywords
References
- Cvejic, N., & Seppanen, T. (2002, December). Increasing the capacity of LSB-based audio steganography. In 2002 IEEE Workshop on Multimedia Signal Processing.
- Djebbar, F., Ayad, B., Hamam, H., & Abed-Meraim, K. (2011, April). A view on latest audio steganography techniques. In 2011 International Conference on Innovations in Information Technology (pp. 409-414). IEEE Transactions on Information Forensics and Security, 9(5), 741-751.
- Johri, P., Mishra, A., Das, S., & Kumar, A. (2016, March). Survey on steganography methods (text, image, audio, video, protocol and network steganography). In 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 2906-2909).
- Jonathan, K., & Yehuda, L. (2015). Introduction to Modern Cryptography.-2nd. http://203.162.10.101/jspui/handle/123456789/723
- Kadhim, I. J., Premaratne, P., Vial, P. J., & Halloran, B. (2019). Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing, 335, 299-326.
- Liu, G., Zhai, J., & Dai, Y. (2012). Network covert timing channel with distribution matching. Telecommunication Systems, 49(2), 199-205.
- Mazurczyk, W., Wendzel, S., Azagra Villares, I., & Szczypiorski, K. (2016). On importance of steganographic cost for network steganography. Security and Communication Networks, 9(8), 781-790.
- Narayana, V. L., Gopi, A. P., & Kumar, N. A. (2018). Different techniques for hiding the text information using text steganography techniques. Neurocomputing, 335, 299-326.
Details
Primary Language
English
Subjects
Engineering
Journal Section
Conference Paper
Authors
Moses Oyaro Okello
Uganda
Publication Date
December 31, 2021
Submission Date
August 10, 2021
Acceptance Date
October 1, 2021
Published in Issue
Year 2021 Volume: 16