Results 1 to 10 of about 349 (102)

Text coverless information hiding method based on synonyms expansion and label delivery mechanism [PDF]

open access: yesTongxin xuebao, 2021
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Zhen ZHANG   +5 more
doaj   +6 more sources

Coverless Information Hiding Method Based on Web Text [PDF]

open access: yesIEEE Access, 2019
Coverless information hiding has become a hot topic because it can hide secret information (SI) into carriers without any modification. Aiming at the problems of the low hiding capacity (HC) and mismatch in text big data, a novel method of coverless ...
Yi Long   +4 more
doaj   +2 more sources

Coverless information hiding based on the generation of anime characters [PDF]

open access: yesEURASIP Journal on Image and Video Processing, 2020
To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only require a huge image database, but also have a very
Yi Cao   +4 more
doaj   +2 more sources

A video coverless information hiding algorithm based on semantic segmentation [PDF]

open access: yesEURASIP Journal on Image and Video Processing, 2020
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan   +4 more
doaj   +2 more sources

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment [PDF]

open access: yesIEEE Access, 2019
Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure
Zhili Zhou   +4 more
doaj   +2 more sources

Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]

open access: yesComputers, Materials & Continua, 2018
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao   +3 more
core   +3 more sources

Enhancing of coverless image steganography capacity based on image block features [PDF]

open access: yes, 2023
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
A. Ali, Suhad   +2 more
core   +2 more sources

Securing Messages by Using Coverless Steganography : A Survey [PDF]

open access: yes, 2022
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core   +2 more sources

A coverless image steganography based on robust image wavelet hashing [PDF]

open access: yes, 2022
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Ali, Suhad A.   +2 more
core   +2 more sources

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning

open access: yesIEEE Access, 2021
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy