Combining Different Existing Methods for Describing Steganography Hiding Methods
- URL: http://arxiv.org/abs/2506.01700v1
- Date: Mon, 02 Jun 2025 14:02:54 GMT
- Title: Combining Different Existing Methods for Describing Steganography Hiding Methods
- Authors: Steffen Wendzel, Christian Krätzer, Jana Dittmann, Luca Caviglione, Aleksandra Mileva, Tobias Schmidbauer, Claus Vielhauer, Sebastian Zander,
- Abstract summary: This paper aims to provide an introduction to the concept of descriptive methods for steganography.<n>The main goal of the paper is to explain how existing descriptions and taxonomy objects can be combined to achieve a detailed categorization and description of hiding methods.
- Score: 33.986313771360095
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The proliferation of digital carriers that can be exploited to conceal arbitrary data has greatly increased the number of techniques for implementing network steganography. As a result, the literature overlaps greatly in terms of concepts and terminology. Moreover, from a cybersecurity viewpoint, the same hiding mechanism may be perceived differently, making harder the development of a unique defensive strategy or the definition of practices to mitigate risks arising from the use of steganography. To mitigate these drawbacks, several researchers introduced approaches that aid in the unified description of steganography methods and network covert channels. Understanding and combining all descriptive methods for steganography techniques is a challenging but important task. For instance, researchers might want to explain how malware applies a certain steganography technique or categorize a novel hiding approach. Consequently, this paper aims to provide an introduction to the concept of descriptive methods for steganography. The paper is organized in the form of a tutorial, with the main goal of explaining how existing descriptions and taxonomy objects can be combined to achieve a detailed categorization and description of hiding methods. To show how this can effectively help the research community, the paper also contains various real-world examples.
Related papers
- Natias: Neuron Attribution based Transferable Image Adversarial Steganography [62.906821876314275]
adversarial steganography has garnered considerable attention due to its ability to effectively deceive deep-learning-based steganalysis.
We propose a novel adversarial steganographic scheme named Natias.
Our proposed method can be seamlessly integrated with existing adversarial steganography frameworks.
arXiv Detail & Related papers (2024-09-08T04:09:51Z) - A Comprehensive Review of Few-shot Action Recognition [64.47305887411275]
Few-shot action recognition aims to address the high cost and impracticality of manually labeling complex and variable video data.<n>It requires accurately classifying human actions in videos using only a few labeled examples per class.<n>Numerous approaches have driven significant advancements in few-shot action recognition.
arXiv Detail & Related papers (2024-07-20T03:53:32Z) - Leveraging Open-Vocabulary Diffusion to Camouflaged Instance
Segmentation [59.78520153338878]
Text-to-image diffusion techniques have shown exceptional capability of producing high-quality images from text descriptions.
We propose a method built upon a state-of-the-art diffusion model, empowered by open-vocabulary to learn multi-scale textual-visual features for camouflaged object representations.
arXiv Detail & Related papers (2023-12-29T07:59:07Z) - Deep Learning for Steganalysis of Diverse Data Types: A review of
methods, taxonomy, challenges and future directions [3.2007743266566617]
Steganography and steganalysis have attracted a great deal of interest, particularly from law enforcement.
This review paper provides a comprehensive overview of deep learning-based steganalysis techniques.
arXiv Detail & Related papers (2023-08-08T18:37:24Z) - Stance Detection: A Practical Guide to Classifying Political Beliefs in Text [0.0]
This paper advances text analysis methods by precisely defining stance detection.
I present three distinct approaches: supervised classification, natural language inference, and in-context learning with generative language models.
I provide guidance on application and validation techniques, as well as coding tutorials for implementation.
arXiv Detail & Related papers (2023-05-02T18:49:12Z) - A Survey on Graph Counterfactual Explanations: Definitions, Methods, Evaluation, and Research Challenges [9.206590881401528]
Graph Neural Networks (GNNs) perform well in community detection and molecule classification.
Counterfactual Explanations (CE) provide counter-examples to overcome the transparency limitations of black-box models.
arXiv Detail & Related papers (2022-10-21T16:29:14Z) - Scene Graph Generation: A Comprehensive Survey [35.80909746226258]
Scene graph has been the focus of research because of its powerful semantic representation and applications to scene understanding.
Scene Graph Generation (SGG) refers to the task of automatically mapping an image into a semantic structural scene graph.
We review 138 representative works that cover different input modalities, and systematically summarize existing methods of image-based SGG.
arXiv Detail & Related papers (2022-01-03T00:55:33Z) - A Survey on Deep Semi-supervised Learning [51.26862262550445]
We first present a taxonomy for deep semi-supervised learning that categorizes existing methods.
We then offer a detailed comparison of these methods in terms of the type of losses, contributions, and architecture differences.
arXiv Detail & Related papers (2021-02-28T16:22:58Z) - There and Back Again: Revisiting Backpropagation Saliency Methods [87.40330595283969]
Saliency methods seek to explain the predictions of a model by producing an importance map across each input sample.
A popular class of such methods is based on backpropagating a signal and analyzing the resulting gradient.
We propose a single framework under which several such methods can be unified.
arXiv Detail & Related papers (2020-04-06T17:58:08Z) - Guiding Graph Embeddings using Path-Ranking Methods for Error Detection
innoisy Knowledge Graphs [0.0]
This work presents various mainstream approaches and proposes a hybrid and modular methodology for the task.
We compare different methods on two benchmarks and one real-world biomedical publications dataset, showcasing the potential of our approach.
arXiv Detail & Related papers (2020-02-19T11:04:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.