Results 71 to 80 of about 957 (173)

Generative steganography method based on auto-generation of contours

open access: yesTongxin xuebao, 2021
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU   +4 more
doaj   +2 more sources

Coverless information hiding based on Generative Model

open access: yes, 2018
4 pages,7 ...
Duan, Xintao, Song, Haoxian
openaire   +2 more sources

A Robust joint coverless image steganography scheme based on two independent modules

open access: yesCybersecurity
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj   +1 more source

Rarity types among plant species with high conservation priority in Switzerland [PDF]

open access: yes, 2018
.: Broennimann O., Vittoz P., Moser D. and Guisan A. 2005. Rarity types among plant species with high conservation priority in Switzerland. Bot. Helv. 115: 95-108.
Broennimann, Olivier   +3 more
core  

Morphology of seismically slow lower-mantle structures [PDF]

open access: yes, 2016
Large low shear velocity provinces (LLSVPs), whose origin and dynamic implication remain enigmatic, dominate the lowermost mantle. For decades, seismologists have created increasingly detailed pictures of the LLSVPs through tomographic models constructed
Cottaar, S, Lekic, V
core   +2 more sources

IMPROVED COVERLESS INFORMATION HIDING UTILIZING GENERATIVE MODELS

open access: yesMağallaẗ Al-kūfaẗ Al-handasiyyaẗ
The submitted algorithm increased data-hiding capacity, extended capability, and improved quality of the reconstructed secret image as compared with traditional steganography and existing coverless information-hiding methods.
Zainab Hdeib Al-Shably
doaj   +1 more source

The Islam-oriented House Structure in Kano: a Vanishing Heritage in Modern City Composition [PDF]

open access: yes, 2012
He debut of colonialism along with the consequent de facto supremacy of the Western world did not onlynegatively impact on the economy and polity of the Muslim world.
Yahya, A. (Ahmad)
core   +1 more source

Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]

open access: yes, 2018
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core   +2 more sources

Coverless Video Steganography based on Maximum DC Coefficients

open access: yes, 2020
Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography.
Meng, Laijin   +4 more
openaire   +2 more sources

Coverless Steganography for Face Recognition Based on Diffusion Model

open access: yesIEEE Access
As a highly recognizable biometric face recognition technology, it has been widely used in many identity verification systems. In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information ...
Yuan Guo, Ziqi Liu
doaj   +1 more source

Home - About - Disclaimer - Privacy