Results 61 to 70 of about 957 (173)

A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image

open access: yesIEEE Access, 2020
With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a
Lina Yang, Haiyu Deng, Xiaocui Dang
doaj   +1 more source

Coverless Steganography for Digital Images Based on a Generative Model [PDF]

open access: yes, 2018
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin   +3 more
core   +2 more sources

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2800-2815, 21 August 2024.
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng   +5 more
wiley   +1 more source

A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features

open access: yesSecurity and Communication Networks, Volume 2024, Issue 1, 2024.
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’
Fan Li   +5 more
wiley   +1 more source

Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]

open access: yes, 2018
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu   +6 more
core   +2 more sources

A Coverless Audio Steganography Based on Generative Adversarial Networks

open access: yesElectronics, 2023
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio.
Jing Li, Kaixi Wang, Xiaozhu Jia
openaire   +1 more source

Games of capacities : a (close) look to Nash Equilibria [PDF]

open access: yes, 2007
The paper studies two games of capacity manipulation in hospital-intern markets. The focus is on the stability of Nash equilibrium outcomes. We provide minimal necessary and sufficient conditions guaranteeing the existence of pure strategy Nash ...
Romero-Medina, Antonio, Triossi, Matteo
core   +1 more source

Coverless Image Steganography Method Based on Feature Selection

open access: yesJournal of Information Hiding and Privacy Protection, 2019
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu   +4 more
openaire   +1 more source

Overview of some commercially important marine demersal fishes and fishery regulations [PDF]

open access: yes, 2018
Global total capture fishery production in 2014 was 93.4 million tonnes, of which 81.5 million tonnes from marine waters and 11.9 million tonnes from inland waters.
Nair, Rekha J
core  

Coverless Information Hiding Based on WGAN-GP Model

open access: yesInternational Journal of Digital Crime and Forensics, 2021
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model.
Xintao Duan   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy