Results 11 to 20 of about 217 (88)
Coverless Image Steganography: Review
Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem.
Shler Farhad Khorshid +1 more
openaire +1 more source
Coverless Image Steganography Based on Generative Adversarial Network [PDF]
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So coverless steganography has become a topic of research in recent years, which has the advantage of ...
Jiaohua Qin +5 more
openaire +2 more sources
Robust coverless steganography using limited mapping images
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes. Compared with the former, mapping-based methods ensure lossless information extraction and stronger attack robustness.
Xiyao Liu +5 more
openaire +2 more sources
Coverless image steganography based on DenseNet feature mapping [PDF]
AbstractSince the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-geometric attacks. However, they do not perform well under some geometric attacks.
Qiang Liu +4 more
openaire +2 more sources
DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models
Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image.
Gao, Zhongpai +7 more
core +2 more sources
Coverless Image Steganography: A Survey
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of information security recently.
Jiaohua Qin +4 more
openaire +2 more sources
End-to-end image steganography using deep convolutional autoencoders [PDF]
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S +4 more
core +2 more sources
Novel linguistic steganography based on character-level text generation [PDF]
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic steganographic methods may suffer from the low embedding capacity problem.
Li, Q, Liu, Y, Xiang, L, Yang, S, Zhu, C
core +1 more source
An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction [PDF]
Рассматривается адаптивный алгоритм стеганографического скрытия информации, основанный на итеративном внесении малозначительных искажений в блоки полноцветных изображений-контейнеров и использующий быстродействующие некриптографические хеш-функции для ...
Дрюченко, М.А.
core +1 more source
Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao +3 more
core +2 more sources

