Results 151 to 160 of about 979 (187)
Some of the next articles are maybe not open access.
A Coverless Image Information Hiding Algorithm Based on Fractal Theory
International Journal of Bifurcation and Chaos, 2020To improve the robustness and imperceptibility of the existing coverless image information hiding, a generative coverless image information hiding algorithm based on fractal theory is proposed in this paper. Firstly, four fractal image generation methods are analyzed, and the relationship between the coverless information hiding and these methods is ...
Xiang Zhang +3 more
openaire +2 more sources
Coverless Image Steganography Framework with Increased Payload Capacity
2019 IEEE International Symposium on Multimedia (ISM), 2019This paper proposes a coverless image steganog- raphy framework with increased payload hiding capacity for confidential information transmission. This is superior to existing coverless schemes which require transmitting a stream of stego images in sequence due to the issue of small hiding capacity per stego image.
Ying Zhang +4 more
openaire +1 more source
Coverless Information Hiding Based on Robust Image Hashing
2017Traditional image steganography modifies the content of the image more or less, it is hard to resist the detection of image steganalysis tools. New kind of steganography methods, coverless steganography methods, attract research attention recently due to its virtue of do not modify the content of the stego image at all.
Shuli Zheng +3 more
openaire +1 more source
Text Coverless Information Hiding Based on Word2vec
2018Coverless information hiding does not make any modifications to the carrier, so it can effectively resist the various steganalysis and detection algorithms. However, the existing methods still have some problems that include low hiding capacity and unsatisfactory hiding success rate.
Yi Long, Yuling Liu
openaire +1 more source
Coverless Video Steganography Based on Inter Frame Combination
2021In most coverless image steganography methods, the number of images increases exponentially with the increase of hidden message bits, which is difficult to construct such a dataset. And several images in semantic irrelevance are usually needed to represent more secret message bits, which are easy to cause the attacker’s attention and bring some ...
Liming Zou +3 more
openaire +1 more source
A Coverless video steganography: A Survey
2022 5th International Conference on Engineering Technology and its Applications (IICETA), 2022Mohammed Ayad Kadhim, Majid Jabbar Jawad
openaire +1 more source
ACGAN based coverless image steganography method
7th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, 2022Yi An +4 more
openaire +1 more source
FedSteg: Coverless Steganography‐Based Privacy‐Preserving Decentralized Federated Learning
IEEJ Transactions on Electrical and Electronic EngineeringFederated learning (FL) represents a novel privacy‐preserving learning paradigm that offers a practical solution for distributed privacy preservation. Although privacy‐preserving FL based on homomorphic encryption (HE‐PPFL) exhibits resistance to gradient leakage attacks while ensuring the accuracy of aggregation results, its widespread adoption in ...
Mengfan Xu, Yaguang Lin
openaire +1 more source
Coverless Image Steganography Based on Machine Learning Techniques
Journal of Cybersecurity and Information ManagementImage steganography is a technique used to conceal secret information within digital images in such a way that the existence of the hidden data is not perceptible to the human eye. This method leverages the vast amount of data contained in image files, embedding the secret message by altering certain pixel values in a manner that is undetectable.
admin admin +2 more
openaire +1 more source

