Results 21 to 30 of about 217 (88)

New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]

open access: yes, 2023
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core   +2 more sources

A Fusion Steganographic Algorithm Based on Faster R-CNN [PDF]

open access: yes, 2018
The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media.
Jin Wang   +3 more
core   +2 more sources

Image Steganography: A Review of the Recent Advances [PDF]

open access: yes, 2021
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Al-Maadeed, Somaya   +3 more
core   +2 more sources

Coverless Image Steganography Method Based on Feature Selection

open access: yesJournal of Information Hiding and Privacy Protection, 2019
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu   +4 more
openaire   +1 more source

STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN [PDF]

open access: yes, 2022
Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where ...
Febrian, Ibnu   +3 more
core   +1 more source

An image steganography using improved hyper-chaotic Henon map and fractal Tromino [PDF]

open access: yes, 2023
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images ...
Krishnan, Kalimuthu   +1 more
core   +2 more sources

IDGAN: Information-Driven Generative Adversarial Network of Coverless Image Steganography

open access: yesElectronics, 2023
Traditional image steganography techniques complete the steganography process by embedding secret information into cover images, but steganalysis tools can easily detect detectable pixel changes that lead to the leakage of confidential information.
Chunying Zhang   +7 more
openaire   +1 more source

Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network [PDF]

open access: yes, 2018
Deep neural network has proven to be very effective in computer vision fields. Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing ...
Chuanlong Li   +2 more
core   +2 more sources

An Efficient Light-weight LSB steganography with Deep learning Steganalysis

open access: yes, 2022
Active research is going on to securely transmit a secret message or so-called steganography by using data-hiding techniques in digital images. After assessing the state-of-the-art research work, we found, most of the existing solutions are not promising
Das, Dipnarayan   +2 more
core   +1 more source

Text hiding in text using invisible character [PDF]

open access: yes, 2020
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples.
Mustafa, Nada Abdul Aziz
core   +3 more sources

Home - About - Disclaimer - Privacy