Results 11 to 20 of about 979 (187)
Coverless Image Steganography Based on Generative Adversarial Network [PDF]
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin, Jing Wang, Yun Tan
exaly +4 more sources
Robust coverless steganography using limited mapping images
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Yipeng Ding
exaly +4 more sources
Coverless Steganography Based on Motion Analysis of Video [PDF]
With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed.
Yun Tan +4 more
openaire +2 more sources
Coverless VoIP Steganography Using Hash and Hash
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj +2 more sources
Coverless Image Steganography: A Survey
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin +4 more
doaj +2 more sources
Coverless image steganography based on DenseNet feature mapping [PDF]
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu +4 more
doaj +2 more sources
Enhanced classification prostate cancer based on generative adversarial networks and integrated deep learning with vision transformer models [PDF]
By eliminating the need to alter the source images, this paper introduces a secure technique for coverless image steganography that strengthens defense against steganalysis attacks.
Wessam M. Salama, Moustafa H. Aly
doaj +2 more sources
Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou, Yi Cao, Meimin Wang
exaly +3 more sources
Coverless Video Steganography Based on Audio and Frame Features
The coverless steganography based on video has become a research hot spot recently. However, the existing schemes usually hide secret information based on the single-frame feature of video and do not take advantage of other rich features. In this work, we propose a novel coverless steganography, which makes full use of the audio and frame image ...
Chunhu Zhang +3 more
openaire +2 more sources
Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad +2 more
doaj +1 more source

