Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core +2 more sources
A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core +2 more sources
Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca +3 more
core +1 more source
Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
As an emerging concept, steganography without embedding (SWE) hides a secret message without directly embedding it into a cover. Thus, SWE has the unique advantage of being immune to typical steganalysis methods and can better protect the secret message ...
Lin, Yu +5 more
core
A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen +3 more
core +2 more sources
Secure eHealth: A Secure eHealth System to Detect COVID Using Image Steganography [PDF]
COVID is a pandemic which has spread to all parts of the world. Detection of COVID infection is crucial to prevent the spread further. Contactless health care systems are essential which can be implemented with Cloud computing.
Al-Maadeed, Somaya +2 more
core +1 more source
Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman +8 more
core +2 more sources
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia +5 more
core
Secure and Practical High Capacity Coverless Image Steganography Approach : WYSAWIS
Abstract Rather than directly embed the secret message in pixels of an image, the new concept of coverless image steganography hides a message in a cover image without modifying it, which significantly increases the resilience to image steganalysis tools.
Damaris B. M. Fotso +3 more
openaire +1 more source
Towards Improved Steganalysis: When Cover Selection is Used in Steganography [PDF]
This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a ...
Li, Shujun, Wang, Zichi, Zhang, Xinpeng
core +1 more source

