Results 1 to 10 of about 390 (143)

Coverless Image Steganography: A Survey [PDF]

open access: goldIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +5 more sources

Coverless image steganography based on DenseNet feature mapping [PDF]

open access: goldEURASIP Journal on Image and Video Processing, 2020
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu   +4 more
doaj   +5 more sources

Coverless Image Steganography Based on Generative Adversarial Network [PDF]

open access: goldMathematics, 2020
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin   +5 more
doaj   +6 more sources

Robust coverless steganography using limited mapping images

open access: hybridJournal of King Saud University: Computer and Information Sciences, 2022
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Xiyao Liu   +5 more
doaj   +5 more sources

Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]

open access: goldEURASIP Journal on Wireless Communications and Networking, 2022
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Yung-Hui Li   +5 more
doaj   +5 more sources

Enhancing of coverless image steganography capacity based on image block features [PDF]

open access: diamondTELKOMNIKA (Telecommunication Computing Electronics and Control), 2023
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
Hadeel Talib Mangi   +2 more
core   +5 more sources

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning [PDF]

open access: goldIEEE Access, 2021
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad   +2 more
doaj   +4 more sources

A coverless image steganography based on robust image wavelet hashing [PDF]

open access: diamondTELKOMNIKA (Telecommunication Computing Electronics and Control), 2022
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Nadia A. Karim   +2 more
core   +5 more sources

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: goldJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +2 more sources

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association [PDF]

open access: hybridSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao   +4 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy