A coverless image steganography based on robust image wavelet hashing [PDF]
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Ali, Suhad A. +2 more
core +3 more sources
Enhancing of coverless image steganography capacity based on image block features [PDF]
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
A. Ali, Suhad +2 more
core +3 more sources
Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Aslam, Muhammad Saqlain +5 more
core +3 more sources
Coverless Steganography for Digital Images Based on a Generative Model [PDF]
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin +3 more
core +3 more sources
Securing Messages by Using Coverless Steganography : A Survey [PDF]
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core +2 more sources
Review on feature-based method performance in text steganography [PDF]
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi +4 more
core +3 more sources
A High Secured Steganalysis using QVDHC Model [PDF]
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression.
Akki, Praveena +4 more
core +3 more sources
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources
A SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY [PDF]
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID technology that has already been proposed by other researchers.
Nhapi, Lincoln, Phiri, Misheck
core +2 more sources
Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu +6 more
core +2 more sources

