Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
1. New High Secure Network Steganography Method Based on Packet Length

Vajiheh Sabeti; Minoo Shoaei

Volume 12, Issue 1 , Winter and Spring 2020, , Pages 24-44

http://dx.doi.org/10.22042/isecure.2020.194573.475

Abstract
  In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has ...  Read More

2. A survey on digital data hiding schemes: principals, algorithms, and applications

M. A. Akhaee; F. Marvasti

Volume 5, Issue 1 , Winter and Spring 2013, , Pages 5-36

http://dx.doi.org/10.22042/isecure.2013.5.1.2

Abstract
  This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria ...  Read More

3. Eigenvalues-based LSB steganalysis

F. Farhat; A. Diyanat; Sh. Ghaemmaghami; M. R. Aref

Volume 4, Issue 2 , Summer and Autumn 2012, , Pages 97-106

http://dx.doi.org/10.22042/isecure.2013.4.2.1

Abstract
  So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through ...  Read More

4. Detection of perturbed quantization (PQ) steganography based on empirical matrix

M. Abolghasemi; H. Aghaeinia; K. Faez

Volume 2, Issue 2 , Summer and Autumn 2010, , Pages 119-128

http://dx.doi.org/10.22042/isecure.2015.2.2.5

Abstract
  Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower ...  Read More

5. Steganalysis of embedding in difference of image pixel pairs by neural network

V. Sabeti; Sh. Samavi; M. Mahdavi; Sh. Shirani

Volume 1, Issue 1 , Winter and Spring 2009, , Pages 17-26

http://dx.doi.org/10.22042/isecure.2015.1.1.3

Abstract
  In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image ...  Read More