Generative steganography method based on auto-generation of contours
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU +4 more
doaj +2 more sources
Coverless information hiding based on Generative Model
4 pages,7 ...
Duan, Xintao, Song, Haoxian
openaire +2 more sources
A Robust joint coverless image steganography scheme based on two independent modules
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj +1 more source
Rarity types among plant species with high conservation priority in Switzerland [PDF]
.: Broennimann O., Vittoz P., Moser D. and Guisan A. 2005. Rarity types among plant species with high conservation priority in Switzerland. Bot. Helv. 115: 95-108.
Broennimann, Olivier +3 more
core
Morphology of seismically slow lower-mantle structures [PDF]
Large low shear velocity provinces (LLSVPs), whose origin and dynamic implication remain enigmatic, dominate the lowermost mantle. For decades, seismologists have created increasingly detailed pictures of the LLSVPs through tomographic models constructed
Cottaar, S, Lekic, V
core +2 more sources
IMPROVED COVERLESS INFORMATION HIDING UTILIZING GENERATIVE MODELS
The submitted algorithm increased data-hiding capacity, extended capability, and improved quality of the reconstructed secret image as compared with traditional steganography and existing coverless information-hiding methods.
Zainab Hdeib Al-Shably
doaj +1 more source
The Islam-oriented House Structure in Kano: a Vanishing Heritage in Modern City Composition [PDF]
He debut of colonialism along with the consequent de facto supremacy of the Western world did not onlynegatively impact on the economy and polity of the Muslim world.
Yahya, A. (Ahmad)
core +1 more source
Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core +2 more sources
Coverless Video Steganography based on Maximum DC Coefficients
Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography.
Meng, Laijin +4 more
openaire +2 more sources
Coverless Steganography for Face Recognition Based on Diffusion Model
As a highly recognizable biometric face recognition technology, it has been widely used in many identity verification systems. In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information ...
Yuan Guo, Ziqi Liu
doaj +1 more source

