Results 21 to 30 of about 390 (143)

Coverless Image Steganography System Based on Maze Game Generation [PDF]

open access: bronzeIntelligent Automation & Soft Computing, 2023
Al Hussien Seddik Saad   +6 more
openalex   +2 more sources

Coverless Image Steganography: Review

open access: hybridAcademic Journal of Nawroz University, 2022
Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem.
Shler Farhad Khorshid, Wafaa Abdullah
openalex   +3 more sources

Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

open access: diamondComputers, Materials & Continua, 2021
Al Hussien Seddik Saad   +2 more
openalex   +2 more sources

Information Hiding Using Coverless Steganography System Based on Image Generation [PDF]

open access: bronzeScientific Journal for Damietta Faculty of Science, 2022
Mohammed Reda   +3 more
openalex   +2 more sources

Securing Messages by Using Coverless Steganography : A Survey [PDF]

open access: yes, 2022
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core   +2 more sources

Steganographic secret sharing via AI-generated photorealistic images

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Steganographic secret sharing is an access control technique that transforms a secret message into multiple shares in a steganographic sense. Each share is in a human-readable format in order to dispel suspicion from a malicious party during transmission
Kai Gao   +3 more
doaj   +1 more source

Review on feature-based method performance in text steganography [PDF]

open access: yes, 2021
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi   +4 more
core   +3 more sources

FakeSafe: Human Level Steganography Techniques by Disinformation Mapping Using Cycle-Consistent Adversarial Network

open access: yesIEEE Access, 2021
Steganography is the task of concealing a message within an overt medium such that the presence of the hidden message is barely detectable. Recently, myriads of works have introduced the inchoate techniques of deep learning to the field of steganography.
He Zhu, Dianbo Liu
doaj   +1 more source

Hyper Coupled Map Lattices for Hiding Multiple Images

open access: yesComplexity, Volume 2023, Issue 1, 2023., 2023
The concept of a hyper coupled map lattice (CML) is presented in this paper. The complexity of the lattice is increased not by adding another spatial dimension of the lattice but by replacing scalar nodal variables by multidimensional square matrices of iterative variables.
Rasa Smidtaite   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy