2021 3rd International Cyber Resilience Conference (CRC) 2021
DOI: 10.1109/crc50527.2021.9392522
|View full text |Cite
|
Sign up to set email alerts
|

A Steganography Embedding Method Based on Psingle / Pdouble and Huffman Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Therefore, such attacks are most times devastating as they cause disruptions and significant financial losses to the victims [2,3]. One major issue is that despite the growing incidents of these attacks, there are things that are yet to be known about them [4,5] as most of the existing research has mostly focused on their technical aspects by developing mostly the mechanisms for their detection and prevention [6], while neglecting the social and behavioural aspects of such attacks, such as how the social media facilitate the dissemination of information about these attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, such attacks are most times devastating as they cause disruptions and significant financial losses to the victims [2,3]. One major issue is that despite the growing incidents of these attacks, there are things that are yet to be known about them [4,5] as most of the existing research has mostly focused on their technical aspects by developing mostly the mechanisms for their detection and prevention [6], while neglecting the social and behavioural aspects of such attacks, such as how the social media facilitate the dissemination of information about these attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Ransomware-as-a-Service allows anyone to create ransomware easily, leading to the current malware ontology's inability to accommodate the vast variety of ransomware types [6]. Twitter can be valuable for gathering vulnerability data since ethical hackers often report new malware findings.…”
Section: Introductionmentioning
confidence: 99%
“…The second technique used to ensure the security of secret data is cryptography [14], [15]. Cryptography is one of the major important techniques and is widely used in our life, especially in information security [14], [16]. Cryptography is one of the mathematical methods that ensure the security of information communications.…”
Section: Introductionmentioning
confidence: 99%
“…Information hiding can be divided into two broad types, including steganography and watermarking (Taha et al, 2021); both are used to hide secret Messages, Both approaches are related, but each has a different goal in mind. Watermarking is primarily intended to preserve the integrity of private data from eavesdroppers, with or without disguising the communication's existence.…”
Section: Introductionmentioning
confidence: 99%