Results 71 to 80 of about 979 (187)
VidaGAN: Adaptive GAN for image steganography
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi +2 more
wiley +1 more source
AI‐generated video steganography based on semantic segmentation
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin +4 more
wiley +1 more source
A Coverless Audio Steganography Based on Generative Adversarial Networks
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio.
Jing Li, Kaixi Wang, Xiaozhu Jia
openaire +1 more source
Hiding image into image with hybrid attention mechanism based on GANs
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu +3 more
wiley +1 more source
Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu +6 more
core +2 more sources
Coverless Image Steganography Method Based on Feature Selection
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu +4 more
openaire +1 more source
SIHNet: A safe image hiding method with less information leaking
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng +5 more
wiley +1 more source
Games of capacities : a (close) look to Nash Equilibria [PDF]
The paper studies two games of capacity manipulation in hospital-intern markets. The focus is on the stability of Nash equilibrium outcomes. We provide minimal necessary and sufficient conditions guaranteeing the existence of pure strategy Nash ...
Romero-Medina, Antonio, Triossi, Matteo
core +1 more source
Coverless Information Hiding Based on WGAN-GP Model
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model.
Xintao Duan +5 more
openaire +2 more sources
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’
Fan Li +5 more
wiley +1 more source

