Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core +2 more sources
An Electronic Lattice Construction Method Based on Game Padding
The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity ...
Congfei Sun, Kaixi Wang
doaj +1 more source
Coverless Information Hiding Based onDeep Learning Approach:Review
The proliferation of digitalization in the realm of information has paved the way for numerous types of multimedia data to be attacked. Hence, the security of information has become a critical concern. Over the years, image steganography has been widely acknowledged as one of the most effective techniques for securing confidential ...
Zainab Hdeib Al-Shably +1 more
openaire +1 more source
Rarity types among plant species with high conservation priority in Switzerland [PDF]
.: Broennimann O., Vittoz P., Moser D. and Guisan A. 2005. Rarity types among plant species with high conservation priority in Switzerland. Bot. Helv. 115: 95-108.
Broennimann, Olivier +3 more
core
Deep Learning-Based Coverless Image Steganography on Medical Images Shared via Cloud
Coverless image steganography is an approach for creating images with intrinsic colour and texture information that contain hidden secret information. Recently, generative adversarial networks’ (GANs) deep learning transformers have been used to generate
Ambika +2 more
doaj +1 more source
The Islam-oriented House Structure in Kano: a Vanishing Heritage in Modern City Composition [PDF]
He debut of colonialism along with the consequent de facto supremacy of the Western world did not onlynegatively impact on the economy and polity of the Muslim world.
Yahya, A. (Ahmad)
core +1 more source
Coverless Information Hiding Based on Generative adversarial networks
arXiv admin note: text overlap with arXiv:1703.05502 by other ...
Liu, Ming-ming +4 more
openaire +2 more sources
Effectiveness of the Spatial Domain Techniques in Digital Image Steganography
Digital steganography is a new and extremely demanding method for transmitting information securely over the internet while employing a covert device. Since its inception in the 1990s till the present, digital steganography has a lengthy history.
Rosshini Selvamani, Yusliza Yusoff
doaj +1 more source
A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core +2 more sources
Stent Graft Placement for Injured Visceral Artery. [PDF]
Miyayama S +7 more
europepmc +1 more source

