Results 51 to 60 of about 217 (88)

Image steganalysis using active learning and hyperparameter optimization. [PDF]

open access: yesSci Rep
Bohang L   +9 more
europepmc   +1 more source

Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography

open access: yes
Linguistic steganography provides convenient implementation to hide messages, particularly with the emergence of AI generation technology. The potential abuse of this technology raises security concerns within societies, calling for powerful linguistic ...
Huang, Yongfeng   +3 more
core  
Some of the next articles are maybe not open access.

Related searches:

A Robust Coverless Steganography Scheme Using Camouflage Image

IEEE Transactions on Circuits and Systems for Video Technology, 2022
Recently, most coverless image steganography (CIS) methods are based on robust mapping rules. However, due to the limited mapping expression relationship between secret information and hash sequence, it is a challenge to further improve the hiding ability of coverless information hiding.
Qiang Liu   +4 more
openaire   +1 more source

Coverless Image Steganography Based on Multi-Object Recognition

IEEE Transactions on Circuits and Systems for Video Technology, 2021
Most of the existing coverless steganography approaches have poor robustness to geometric attacks, because these approaches use features of the entire image to map information, and these features are easy to be lost when being attacked. In order to improve the robustness against geometric attacks, we propose a coverless image steganography method based
Yuanjing Luo   +3 more
openaire   +1 more source

Coverless Image Steganography using Haar Integer Wavelet Transform

2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), 2020
Coverless hnage steganography is a recently discovered steganography method Which does not modify the image carrying the secret information. However, the techniques proposed until now have low efficiency capable of transferring few bits per image. This paper focuses on increasing the amount of data transmitted in an image, when using coverless image ...
Vivek Govindasamy   +2 more
openaire   +1 more source

Coverless image steganography using partial-duplicate image retrieval

Soft Computing, 2018
Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis ...
Zhili Zhou, Yan Mu, Q. M. Jonathan Wu
openaire   +1 more source

Home - About - Disclaimer - Privacy