Results 21 to 30 of about 957 (173)

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley   +1 more source

Coverless information hiding based on the generation of anime characters

open access: yesEURASIP Journal on Image and Video Processing, 2020
To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only require a huge image database, but also have a very
Yi Cao   +4 more
doaj   +1 more source

Enhancing of coverless image steganography capacity based on image block features [PDF]

open access: yes, 2023
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
A. Ali, Suhad   +2 more
core   +2 more sources

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao   +5 more
wiley   +1 more source

Performance of a large limited streamer tube cell in drift mode [PDF]

open access: yes, 2001
The performance of a large (3x3 $cm^2$) streamer tube cell in drift mode is shown. The detector space resolution has been studied using cosmic muons crossing an high precision silicon telescope.
Ahlen   +11 more
core   +3 more sources

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

Securing Messages by Using Coverless Steganography : A Survey [PDF]

open access: yes, 2022
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core   +2 more sources

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou   +4 more
doaj   +1 more source

Muon Energy Estimate Through Multiple Scattering with the Macro Detector [PDF]

open access: yes, 2002
Muon energy measurement represents an important issue for any experiment addressing neutrino induced upgoing muon studies. Since the neutrino oscillation probability depends on the neutrino energy, a measurement of the muon energy adds an important piece
A. Baldini   +131 more
core   +2 more sources

A coverless image steganography based on robust image wavelet hashing [PDF]

open access: yes, 2022
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Ali, Suhad A.   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy