Results 11 to 20 of about 979 (187)

Coverless Image Steganography Based on Generative Adversarial Network [PDF]

open access: yesMathematics, 2020
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin, Jing Wang, Yun Tan
exaly   +4 more sources

Robust coverless steganography using limited mapping images

open access: yesJournal of King Saud University - Computer and Information Sciences, 2022
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Yipeng Ding
exaly   +4 more sources

Coverless Steganography Based on Motion Analysis of Video [PDF]

open access: yesSecurity and Communication Networks, 2021
With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed.
Yun Tan   +4 more
openaire   +2 more sources

Coverless VoIP Steganography Using Hash and Hash

open access: yesCybernetics and Information Technologies, 2020
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj   +2 more sources

Coverless Image Steganography: A Survey

open access: yesIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +2 more sources

Coverless image steganography based on DenseNet feature mapping [PDF]

open access: yesEURASIP Journal on Image and Video Processing, 2020
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu   +4 more
doaj   +2 more sources

Enhanced classification prostate cancer based on generative adversarial networks and integrated deep learning with vision transformer models [PDF]

open access: yesScientific Reports
By eliminating the need to alter the source images, this paper introduces a secure technique for coverless image steganography that strengthens defense against steganalysis attacks.
Wessam M. Salama, Moustafa H. Aly
doaj   +2 more sources

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou, Yi Cao, Meimin Wang
exaly   +3 more sources

Coverless Video Steganography Based on Audio and Frame Features

open access: yesSecurity and Communication Networks, 2022
The coverless steganography based on video has become a research hot spot recently. However, the existing schemes usually hide secret information based on the single-frame feature of video and do not take advantage of other rich features. In this work, we propose a novel coverless steganography, which makes full use of the audio and frame image ...
Chunhu Zhang   +3 more
openaire   +2 more sources

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning

open access: yesIEEE Access, 2021
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy