Results 71 to 80 of about 979 (187)

VidaGAN: Adaptive GAN for image steganography

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3329-3342, 16 October 2024.
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi   +2 more
wiley   +1 more source

AI‐generated video steganography based on semantic segmentation

open access: yesIET Image Processing, Volume 18, Issue 11, Page 3042-3054, 18 September 2024.
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin   +4 more
wiley   +1 more source

A Coverless Audio Steganography Based on Generative Adversarial Networks

open access: yesElectronics, 2023
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio.
Jing Li, Kaixi Wang, Xiaozhu Jia
openaire   +1 more source

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2679-2689, 21 August 2024.
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu   +3 more
wiley   +1 more source

Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]

open access: yes, 2018
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu   +6 more
core   +2 more sources

Coverless Image Steganography Method Based on Feature Selection

open access: yesJournal of Information Hiding and Privacy Protection, 2019
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu   +4 more
openaire   +1 more source

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2800-2815, 21 August 2024.
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng   +5 more
wiley   +1 more source

Games of capacities : a (close) look to Nash Equilibria [PDF]

open access: yes, 2007
The paper studies two games of capacity manipulation in hospital-intern markets. The focus is on the stability of Nash equilibrium outcomes. We provide minimal necessary and sufficient conditions guaranteeing the existence of pure strategy Nash ...
Romero-Medina, Antonio, Triossi, Matteo
core   +1 more source

Coverless Information Hiding Based on WGAN-GP Model

open access: yesInternational Journal of Digital Crime and Forensics, 2021
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model.
Xintao Duan   +5 more
openaire   +2 more sources

A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features

open access: yesSecurity and Communication Networks, Volume 2024, Issue 1, 2024.
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’
Fan Li   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy