An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley +1 more source
Coverless Steganography Based on Low Similarity Feature Selection in DCT Domain [PDF]
Coverless image steganography typically extracts feature sequences from cover images to map information. Once the extracted features have high similarity, it is challenging to construct a complete mapping sequence set, which places a heavy burden on the ...
L. Tan, J. Liu, Y. Zhou, R. Chen
doaj
Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Aslam, Muhammad Saqlain +5 more
core +1 more source
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao +5 more
wiley +1 more source
Coverless image steganography based on DenseNet feature mapping
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu +4 more
doaj +1 more source
Stone Painting Generative Information Hiding Method Through Triangulation and Bezier Curves [PDF]
Unlike natural carrier-based coverless information hiding, non-natural carrier-based coverless information hiding does not attempt to generate or utilize natural carriers to hide secret information, which can fundamentally avoid the discrimination ...
REN Zhiyi, SHAO Liping
doaj +1 more source
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources
A High Secured Steganalysis using QVDHC Model [PDF]
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression.
Akki, Praveena +4 more
core +3 more sources
A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image
With the rapid development of information technology recently, information security has become the focus of public concern. Information Hiding (IH) technology is an effective method to tackle the problem of information leakage incidents. In this paper, a
Lina Yang, Haiyu Deng, Xiaocui Dang
doaj +1 more source
Coverless Steganography for Digital Images Based on a Generative Model [PDF]
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin +3 more
core +2 more sources

