A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image
With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a
Lina Yang, Haiyu Deng, Xiaocui Dang
doaj +1 more source
Coverless Steganography for Digital Images Based on a Generative Model [PDF]
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin +3 more
core +2 more sources
SIHNet: A safe image hiding method with less information leaking
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng +5 more
wiley +1 more source
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’
Fan Li +5 more
wiley +1 more source
Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu +6 more
core +2 more sources
A Coverless Audio Steganography Based on Generative Adversarial Networks
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio.
Jing Li, Kaixi Wang, Xiaozhu Jia
openaire +1 more source
Games of capacities : a (close) look to Nash Equilibria [PDF]
The paper studies two games of capacity manipulation in hospital-intern markets. The focus is on the stability of Nash equilibrium outcomes. We provide minimal necessary and sufficient conditions guaranteeing the existence of pure strategy Nash ...
Romero-Medina, Antonio, Triossi, Matteo
core +1 more source
Coverless Image Steganography Method Based on Feature Selection
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu +4 more
openaire +1 more source
Overview of some commercially important marine demersal fishes and fishery regulations [PDF]
Global total capture fishery production in 2014 was 93.4 million tonnes, of which 81.5 million tonnes from marine waters and 11.9 million tonnes from inland waters.
Nair, Rekha J
core
Coverless Information Hiding Based on WGAN-GP Model
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model.
Xintao Duan +5 more
openaire +2 more sources

