Results 61 to 70 of about 217 (88)
Some of the next articles are maybe not open access.
Coverless Image Steganography Without Embedding
2015The traditional image steganography technologies designate a cover image and embed secret data into it to form the stego-image. However, the modification traces caused by the embedding will be left in the cover image, which makes successful steganalysis possible.
Zhili Zhou +4 more
openaire +1 more source
Coverless Image Steganography Framework with Increased Payload Capacity
2019 IEEE International Symposium on Multimedia (ISM), 2019This paper proposes a coverless image steganog- raphy framework with increased payload hiding capacity for confidential information transmission. This is superior to existing coverless schemes which require transmitting a stream of stego images in sequence due to the issue of small hiding capacity per stego image.
Ying Zhang +4 more
openaire +1 more source
Delving into the Methods of Coverless Image Steganography
2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), 2019Conventional cover-based image steganography methods embed secret information by modifying the original state of a cover image. This type of algorithm leaves a trace of changes on output stego image and eventually leads to successful detection by common steganalysis tools.
Koi Yee Ng, Simying Ong, KokSheik Wong
openaire +1 more source
Message Drives Image: A Coverless Image Steganography Framework Using Multi-Domain Image Translation
2021 International Joint Conference on Neural Networks (IJCNN), 2021The coverless steganography methods based on the GAN satisfy the need of large image set which is a shortcoming for traditional coverless methods. But most of GAN based methods have either low hiding capacity or weak robustness. In this paper, to solve these problems we design a coverless image steganography framework based on multi-domain image ...
Rui Xue, Yaning Wang
openaire +1 more source
Hybrid approach for Data Security using Coverless Image Steganography with AES
2021 6th International Conference on Communication and Electronics Systems (ICCES), 2021We need systems which makes data more secure as threats to data are increasing day by day. Cryptography and Steganography are the techniques which resist security threats from adversary entities. The combination of cryptography and steganography helps in achieving the more security of data instead of using the technique alone at a time.
Lalit Negi, Lokesh Negi
openaire +1 more source
Coverless Image Steganography Using Content-Based Image Patch Retrieval
The Computer JournalAbstract Image steganography is the process of concealing secret information within a cover image. The main challenge of steganography is to ensure that the embedding process does not significantly alter the cover file. In this paper, instead of modifying a cover image to carry information, steganography is performed using a set of ...
Fatemeh Taheri, Kambiz Rahbar
openaire +1 more source
3D Coverless Image Steganography Scheme Based on 3D Slice Technology
2021Due to the property that coverless image steganography can hide secret information without modifying the carrier, it has the ability to resist the existing steganalysis tools effectively. However, with the continuous development of new media and the increasing complexity of application scenarios, finding a more se-cure means of covert communication has
Xuyu Xiang +3 more
openaire +1 more source
Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction
IEEE Transactions on Multimedia, 2023Liming Zou +4 more
openaire +1 more source
Coverless Image Steganography Based on Machine Learning Techniques
Journal of Cybersecurity and Information ManagementImage steganography is a technique used to conceal secret information within digital images in such a way that the existence of the hidden data is not perceptible to the human eye. This method leverages the vast amount of data contained in image files, embedding the secret message by altering certain pixel values in a manner that is undetectable.
admin admin +2 more
openaire +1 more source
ACGAN based coverless image steganography method
7th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, 2022Yi An +4 more
openaire +1 more source

