Results 31 to 40 of about 217 (88)

Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]

open access: yes, 2018
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core   +2 more sources

A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]

open access: yes
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core   +2 more sources

Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]

open access: yes, 2023
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca   +3 more
core   +1 more source

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

open access: yes, 2023
As an emerging concept, steganography without embedding (SWE) hides a secret message without directly embedding it into a cover. Thus, SWE has the unique advantage of being immune to typical steganalysis methods and can better protect the secret message ...
Lin, Yu   +5 more
core  

A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]

open access: yes, 2019
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen   +3 more
core   +2 more sources

Secure eHealth: A Secure eHealth System to Detect COVID Using Image Steganography [PDF]

open access: yes, 2020
COVID is a pandemic which has spread to all parts of the world. Detection of COVID infection is crucial to prevent the spread further. Contactless health care systems are essential which can be implemented with Cloud computing.
Al-Maadeed, Somaya   +2 more
core   +1 more source

Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]

open access: yes, 2018
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman   +8 more
core   +2 more sources

Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

open access: yes, 2021
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia   +5 more
core  

Secure and Practical High Capacity Coverless Image Steganography Approach : WYSAWIS

open access: yes, 2023
Abstract Rather than directly embed the secret message in pixels of an image, the new concept of coverless image steganography hides a message in a cover image without modifying it, which significantly increases the resilience to image steganalysis tools.
Damaris B. M. Fotso   +3 more
openaire   +1 more source

Towards Improved Steganalysis: When Cover Selection is Used in Steganography [PDF]

open access: yes, 2019
This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a ...
Li, Shujun, Wang, Zichi, Zhang, Xinpeng
core   +1 more source

Home - About - Disclaimer - Privacy