Results 11 to 20 of about 385 (138)

Hyper Coupled Map Lattices for Hiding Multiple Images

open access: yesComplexity, Volume 2023, Issue 1, 2023., 2023
The concept of a hyper coupled map lattice (CML) is presented in this paper. The complexity of the lattice is increased not by adding another spatial dimension of the lattice but by replacing scalar nodal variables by multidimensional square matrices of iterative variables.
Rasa Smidtaite   +4 more
wiley   +1 more source

Review on feature-based method performance in text steganography [PDF]

open access: yes, 2021
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi   +4 more
core   +3 more sources

IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network

open access: yesIET Image Processing, Volume 16, Issue 11, Page 2854-2862, 18 September 2022., 2022
Abstract Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image‐based information hiding has been a significantly important topic for digital forensics. Here, active image deep steganographic approaches have come forward for hiding data.
Abdullah Ayub Khan   +6 more
wiley   +1 more source

Coverless Information Hiding Based on WGAN-GP Model

open access: yesInternational Journal of Digital Crime and Forensics, 2021
Steganalysis technology judges whether there is secret information in the carrier by monitoring the abnormality of the carrier data, so the traditional information hiding technology has reached the bottleneck. Therefore, this paper proposed the coverless information hiding based on the improved training of Wasserstein GANs (WGAN-GP) model.
Xintao Duan   +5 more
openaire   +2 more sources

A Novel Coverless Text Steganographic Algorithm Based on Polynomial Encryption

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Aiming at the problems of low text utilization rate and ambiguity of secret information extraction in the “tag + keyword” coverless information hiding methods, we propose a coverless information hiding method of Chinese text based on polynomial encryption in this paper.
Bo Guan   +3 more
wiley   +1 more source

Coverless Video Steganography Based on Audio and Frame Features

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The coverless steganography based on video has become a research hot spot recently. However, the existing schemes usually hide secret information based on the single‐frame feature of video and do not take advantage of other rich features. In this work, we propose a novel coverless steganography, which makes full use of the audio and frame image ...
Chunhu Zhang   +4 more
wiley   +1 more source

[Retracted] A Review of Motion Vector‐Based Video Steganography

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Steganography is a popular research direction in the field of information security. Due to the widespread use of video media, video steganography has received much attention from the research community. Among video steganography, motion vector (MV)‐based video steganography has become one of the critical concerns of researchers due to its large ...
Jun Li   +4 more
wiley   +1 more source

An Improved Privacy Protection Algorithm for Multimodal Data Fusion

open access: yesScientific Programming, Volume 2022, Issue 1, 2022., 2022
With the rapid development of Internet technology, the use and sharing of data have brought great opportunities and challenges to mankind. On the one hand, the development of data sharing and analysis technology has promoted the improvement of economic and social benefits.
Z. F. Chen   +6 more
wiley   +1 more source

Coverless Steganography Based on Motion Analysis of Video

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed.
Yun Tan   +5 more
wiley   +1 more source

A coverless steganography method based on generative adversarial network

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy