New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core +2 more sources
A Fusion Steganographic Algorithm Based on Faster R-CNN [PDF]
The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media.
Jin Wang +3 more
core +2 more sources
Image Steganography: A Review of the Recent Advances [PDF]
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Al-Maadeed, Somaya +3 more
core +2 more sources
Coverless Image Steganography Method Based on Feature Selection
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu +4 more
openaire +1 more source
STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN [PDF]
Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where ...
Febrian, Ibnu +3 more
core +1 more source
An image steganography using improved hyper-chaotic Henon map and fractal Tromino [PDF]
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images ...
Krishnan, Kalimuthu +1 more
core +2 more sources
IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography
Traditional image steganography techniques complete the steganography process by embedding secret information into cover images, but steganalysis tools can easily detect detectable pixel changes that lead to the leakage of confidential information.
Chunying Zhang +7 more
openaire +1 more source
Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network [PDF]
Deep neural network has proven to be very effective in computer vision fields. Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing ...
Chuanlong Li +2 more
core +2 more sources
An Efficient Light-weight LSB steganography with Deep learning Steganalysis
Active research is going on to securely transmit a secret message or so-called steganography by using data-hiding techniques in digital images. After assessing the state-of-the-art research work, we found, most of the existing solutions are not promising
Das, Dipnarayan +2 more
core +1 more source
Text hiding in text using invisible character [PDF]
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples.
Mustafa, Nada Abdul Aziz
core +3 more sources

