Results 1 to 10 of about 938 (158)

Coverless Image Steganography Based on Generative Adversarial Network [PDF]

open access: yesMathematics, 2020
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin   +5 more
doaj   +2 more sources

Coverless VoIP Steganography Using Hash and Hash

open access: yesCybernetics and Information Technologies, 2020
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj   +2 more sources

Robust coverless steganography using limited mapping images

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Xiyao Liu   +5 more
doaj   +2 more sources

Coverless Image Steganography: A Survey

open access: yesIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +2 more sources

Coverless image steganography based on DenseNet feature mapping [PDF]

open access: yesEURASIP Journal on Image and Video Processing, 2020
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu   +4 more
doaj   +2 more sources

Enhanced classification prostate cancer based on generative adversarial networks and integrated deep learning with vision transformer models [PDF]

open access: yesScientific Reports
By eliminating the need to alter the source images, this paper introduces a secure technique for coverless image steganography that strengthens defense against steganalysis attacks.
Wessam M. Salama, Moustafa H. Aly
doaj   +2 more sources

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning

open access: yesIEEE Access, 2021
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad   +2 more
doaj   +1 more source

Coverless Image Steganography: Review

open access: yesAcademic Journal of Nawroz University, 2022
Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem.
Shler Farhad Khorshid   +1 more
openaire   +1 more source

Coverless Steganography Based on Low Similarity Feature Selection in DCT Domain [PDF]

open access: yesRadioengineering, 2023
Coverless image steganography typically extracts feature sequences from cover images to map information. Once the extracted features have high similarity, it is challenging to construct a complete mapping sequence set, which places a heavy burden on the ...
L. Tan, J. Liu, Y. Zhou, R. Chen
doaj  

A video coverless information hiding algorithm based on semantic segmentation

open access: yesEURASIP Journal on Image and Video Processing, 2020
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy