A coverless steganography method based on generative adversarial network
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan +4 more
doaj +1 more source
FORMATION OF MIXED AGRO-PHYTOCENOSES OF ALFERA AND CONCEPT IN THE FIRST YEAR OF VEGETATION [PDF]
The studies were carried out on the experimental field of the Penza Agricultural Institute, a branch of the Federal State-Funded Scientific Institution Federal Scientific Center of Fibre Crops in 2017-2019. The purpose of the research is to theoretically
O.A. Timoshkin +3 more
doaj +1 more source
Coverless Information Hiding Method Based on Web Text
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long +4 more
doaj +1 more source
Container Ship Accident Analysis due to Container Stacked on Deck as an Attempt to Improve Maritime Logistic System [PDF]
This paper analyses factors that might cause accidents to the container ships due to containers stacked on deck, and propose applicable actions to minimize these factors.
Priapalla Rahim Gafero, Sunaryo
doaj +1 more source
A portable audio/video recorder for longitudinal study of child development [PDF]
Collection and analysis of ultra-dense, longitudinal observational data of child behavior in natural, ecologically valid, non-laboratory settings holds significant promise for advancing the understanding of child development and developmental disorders ...
Goodwin, Matthew +3 more
core +3 more sources
Review on feature-based method performance in text steganography [PDF]
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi +4 more
core +3 more sources
STBS-Stega: Coverless text steganography based on state transition-binary sequence
Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient ...
Ning Wu +6 more
doaj +1 more source
A conceptual integration approach to the property word nagy ‘big’ [PDF]
This paper describes the various readings of the typically size-related Hungarian adjective nagy ‘big’ in combination with the corresponding noun readings in a corpus-based analysis. Adjective-noun combinations have not only attracted the attention of
Papp, Kornélia
core +1 more source
A Coverless Plain Text Steganography Based on Character Features
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj +1 more source
Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao +3 more
core +2 more sources

