Results 1 to 10 of about 217 (88)

A coverless image steganography based on robust image wavelet hashing [PDF]

open access: yesTELKOMNIKA (Telecommunication Computing Electronics and Control), 2022
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Ali, Suhad A.   +2 more
core   +3 more sources

Enhancing of coverless image steganography capacity based on image block features [PDF]

open access: yesTELKOMNIKA (Telecommunication Computing Electronics and Control), 2023
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
A. Ali, Suhad   +2 more
core   +3 more sources

Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Aslam, Muhammad Saqlain   +5 more
core   +3 more sources

Coverless Steganography for Digital Images Based on a Generative Model [PDF]

open access: yesComputers, Materials & Continua, 2018
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin   +3 more
core   +3 more sources

Securing Messages by Using Coverless Steganography : A Survey [PDF]

open access: yes, 2022
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core   +2 more sources

Review on feature-based method performance in text steganography [PDF]

open access: yes, 2021
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi   +4 more
core   +3 more sources

A High Secured Steganalysis using QVDHC Model [PDF]

open access: yes, 2022
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression.
Akki, Praveena   +4 more
core   +3 more sources

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

A SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY [PDF]

open access: yes, 2022
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID technology that has already been proposed by other researchers.
Nhapi, Lincoln, Phiri, Misheck
core   +2 more sources

Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]

open access: yes, 2018
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu   +6 more
core   +2 more sources

Home - About - Disclaimer - Privacy