Results 41 to 50 of about 979 (187)

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

A coverless image steganography based on robust image wavelet hashing [PDF]

open access: yes, 2022
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Ali, Suhad A.   +2 more
core   +2 more sources

Stone Painting Generative Information Hiding Method Through Triangulation and Bezier Curves [PDF]

open access: yesJisuanji gongcheng
Unlike natural carrier-based coverless information hiding, non-natural carrier-based coverless information hiding does not attempt to generate or utilize natural carriers to hide secret information, which can fundamentally avoid the discrimination ...
REN Zhiyi, SHAO Liping
doaj   +1 more source

Coverless image steganography using morphed face recognition based on convolutional neural network

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Yung-Hui Li   +5 more
doaj   +1 more source

FakeSafe: Human Level Steganography Techniques by Disinformation Mapping Using Cycle-Consistent Adversarial Network

open access: yesIEEE Access, 2021
Steganography is the task of concealing a message within an overt medium such that the presence of the hidden message is barely detectable. Recently, myriads of works have introduced the inchoate techniques of deep learning to the field of steganography.
He Zhu, Dianbo Liu
doaj   +1 more source

Analyzing Satisfaction in Residential Open Space [PDF]

open access: yes, 2013
Zugleich gedruckt veröffentlicht im Universitätsverlag der TU Berlin unter der ISBN 978-3-7983-2542-5.This research has been conducted to investigate the most important criteria in the dwelling environment influenced residents’ satisfaction.
Ghazizadeh, Neda, Rückert, Klaus
core   +1 more source

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: yesJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +1 more source

A coverless steganography method based on generative adversarial network

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +1 more source

FORMATION OF MIXED AGRO-PHYTOCENOSES OF ALFERA AND CONCEPT IN THE FIRST YEAR OF VEGETATION [PDF]

open access: yesVolga Region Farmland, 2020
The studies were carried out on the experimental field of the Penza Agricultural Institute, a branch of the Federal State-Funded Scientific Institution Federal Scientific Center of Fibre Crops in 2017-2019. The purpose of the research is to theoretically
O.A. Timoshkin   +3 more
doaj   +1 more source

Coverless Information Hiding Method Based on Web Text

open access: yesIEEE Access, 2019
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy