scispace - formally typeset
Search or ask a question
Author

Daniela Stanescu

Bio: Daniela Stanescu is an academic researcher from Politehnica University of Timișoara. The author has contributed to research in topics: Steganography & Digital watermarking. The author has an hindex of 6, co-authored 13 publications receiving 115 citations.

Papers
More filters
Proceedings ArticleDOI
25 Jun 2007
TL;DR: A MPEG-2 compliant decoder is proposed which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture.
Abstract: The transmission of streaming data, because of its real-time nature, is subject to bandwidth constraints. We propose a MPEG-2 compliant decoder which uses data hiding to transmit additional data with no extra bandwidth while creating an almost imperceptible degradation of the picture. The additional data can be anything from subtitles to correction signals and watermarking.

32 citations

Proceedings ArticleDOI
28 May 2009
TL;DR: The main purpose of implementing such an algorithm on a microcontroller is to bring steganography and its advantages on low and medium cost mobile and dedicated devices.
Abstract: Steganography is a science dealing with writing hidden messages in a specific way that only the sender and the intended recipient are able to decipher. Important domains, besides classic computing, where steganography can be applied are domains using mobile and embedded devices. This paper focuses on the implementation of a steganographic algorithm on embedded devices - microcontrollers. Furthermore, this article presents experimental results obtained from testing a steganographic algorithm on embedded devices. The main purpose of implementing such an algorithm on a microcontroller is to bring steganography and its advantages on low and medium cost mobile and dedicated devices.

20 citations

Proceedings ArticleDOI
29 Oct 2007
TL;DR: This article presents a method of hiding messages in digital images based on YUV format and its derivatives based on human eye sensitivity on luminance versus chrominance.
Abstract: Steganography means hiding data within data. Exploiting human eye sensitivity on luminance versus chrominance, this article presents a method of hiding messages in digital images based on YUV format and its derivatives.

18 citations

Proceedings ArticleDOI
27 May 2010
TL;DR: This paper tries to state the fact that steganography can be successfully implemented and used into a next generation of mobile phones with image and video processing abilities.
Abstract: Steganography is a science that focuses on hiding specific messages using specialized techniques in such a way as only the sender and the intended receiver are able to decipher it, as well as knowing of its existence. Important domains, besides classic computing, where steganography can be applied are domains using mobile and embedded devices especially mobile phones. This paper tries to state the fact that steganography can be successfully implemented and used into a next generation of mobile phones with image and video processing abilities. Important results presented in this article suggest the fact that steganography can be used inside mobile phones and tablets.

15 citations

Proceedings ArticleDOI
25 Jun 2007
TL;DR: Improved methods for information hiding are presented, based on the decorrelation property of the Karhunen-Loeve transform (KLT), which is a very common technique used against illicit copying and distribution of copyright material.
Abstract: Digital watermarking is a very common technique used against illicit copying and distribution of copyright material. This paper presents improved methods for information hiding. We propose a new approach, based on the decorrelation property of the Karhunen-Loeve transform (KLT).

13 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper, information hiding methods in the H.264/AVC compressed video domain are surveyed and perspectives and recommendations are presented to provide a better understanding of the current trend of information hiding and to identify new opportunities for information hiding in compressed video.
Abstract: Information hiding refers to the process of inserting information into a host to serve specific purpose(s). In this paper, information hiding methods in the H.264/AVC compressed video domain are surveyed. First, the general framework of information hiding is conceptualized by relating the state of an entity to a meaning (i.e., sequences of bits). This concept is illustrated by using various data representation schemes such as bit plane replacement, spread spectrum, histogram manipulation, divisibility, mapping rules, and matrix encoding. Venues at which information hiding takes place are then identified, including prediction process, transformation, quantization, and entropy coding. Related information hiding methods at each venue are briefly reviewed, along with the presentation of the targeted applications, appropriate diagrams, and references. A timeline diagram is constructed to chronologically summarize the invention of information hiding methods in the compressed still image and video domains since 1992. A comparison among the considered information hiding methods is also conducted in terms of venue, payload, bitstream size overhead, video quality, computational complexity, and video criteria. Further perspectives and recommendations are presented to provide a better understanding of the current trend of information hiding and to identify new opportunities for information hiding in compressed video.

128 citations

Journal ArticleDOI
TL;DR: This paper intends to provide an up-to-date comprehensive review on the various video steganographic methods found in the literature in the last 5 years, and some relevant attacks and steganalysis techniques are surveyed.
Abstract: Steganography is the art and science of secret communication, concealing the very existence of a communication. Modern cover types can take many forms such as text documents, audio tracks, digital images, and video streams. Extensive research has been done on image steganography in the previous decade due to their popularity on the internet. Nowadays, video files are drawing much more attention. They are transmitted more and more frequent on internet websites such as Facebook and YouTube imposing a larger practical significance on video steganography. Information hiding in video has a variety of techniques, each of which has its strengths and weaknesses. This paper intends to provide an up-to-date comprehensive review on the various video steganographic methods found in the literature in the last 5 years. Furthermore, since security and robustness are very important issues in designing a good steganographic algorithm, some relevant attacks and steganalysis techniques are also surveyed. The paper concludes with recommendations and good practices drawn from the reviewed techniques.

122 citations

Journal ArticleDOI
TL;DR: This paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014, and showcases the most popular software applications to embed secret data into carriers.
Abstract: By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.

93 citations

Posted Content
TL;DR: In this article, the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014, are surveyed.
Abstract: By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number of vulnerabilities, attacks and hazards to profile individuals or gather sensitive information. However, the majority of works evaluating the security degree of smartphones neglects steganography, which can be mainly used to: i) exfiltrate confidential data via camouflage methods, and ii) conceal valuable or personal information into innocent looking carriers. Therefore, this paper surveys the state of the art of steganographic techniques for smartphones, with emphasis on methods developed over the period 2005 to the second quarter of 2014. The different approaches are grouped according to the portion of the device used to hide information, leading to three different covert channels, i.e., local, object and network. Also, it reviews the relevant approaches used to detect and mitigate steganographic attacks or threats. Lastly, it showcases the most popular software applications to embed secret data into carriers, as well as possible future directions.

70 citations

Journal ArticleDOI
TL;DR: The design of a chaos-based image encryption algorithm with lightweight properties and its optimised implementation on a 32-bit microcontroller and the results of performance analysis regarding smaller memory footprint and better throughput of proposed algorithm guarantee its suitability for real-time embedded applications.

60 citations