2020
DOI: 10.1007/s00521-020-05260-4
|View full text |Cite
|
Sign up to set email alerts
|

Research on information steganography based on network data stream

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…In our previous work [29][30][31][32], we used the spatiotemporal features of traffic for anomaly detection, such as temporal features, combined features, and protocol features. In our algorithm, we not only use the features proposed by our previous work (such as the average number of packets of upstream and downstream traffic, the total size of upstream and downstream data packets, traffic duration, etc.…”
Section: Extraction Of Traffic Spatiotemporal Featuresmentioning
confidence: 99%
“…In our previous work [29][30][31][32], we used the spatiotemporal features of traffic for anomaly detection, such as temporal features, combined features, and protocol features. In our algorithm, we not only use the features proposed by our previous work (such as the average number of packets of upstream and downstream traffic, the total size of upstream and downstream data packets, traffic duration, etc.…”
Section: Extraction Of Traffic Spatiotemporal Featuresmentioning
confidence: 99%
“…Therefore, a meaningful secret image sharing scheme (MSISS), also called the extended secret image sharing scheme, was proposed by Ateniese et al [10]. A noiselike shadow image can be embedded into meaningful carrier images by steganography, which is not bound by the sharing principle and can be applied to various secret sharing schemes [11,12]. Wu et al [13] designed an invertible secret image-sharing scheme,which used steganography and realized authentication.…”
Section: Introductionmentioning
confidence: 99%
“…Chen and Huang [18] compares the weight adjustment method with BP neural network and other methods. Liu et al [19] proposes a new type of data steganography technology based on network data flow. Lu and Zhang [20] improves the traditional data mining methods to different degrees according to the characteristics of different detection objects and puts forward some new detection data analysis and processing and fault diagnosis and prediction methods.…”
mentioning
confidence: 99%