Coverless Image Steganography: A Survey [PDF]
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin +4 more
doaj +5 more sources
Coverless image steganography based on DenseNet feature mapping [PDF]
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu +4 more
doaj +5 more sources
Coverless Image Steganography Based on Generative Adversarial Network [PDF]
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin +5 more
doaj +6 more sources
Robust coverless steganography using limited mapping images
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Xiyao Liu +5 more
doaj +5 more sources
Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Yung-Hui Li +5 more
doaj +5 more sources
Enhancing of coverless image steganography capacity based on image block features [PDF]
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
Hadeel Talib Mangi +2 more
core +5 more sources
Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning [PDF]
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad +2 more
doaj +4 more sources
A coverless image steganography based on robust image wavelet hashing [PDF]
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Nadia A. Karim +2 more
core +5 more sources
Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza +2 more
doaj +2 more sources
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association [PDF]
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao +4 more
openalex +2 more sources

