Results 21 to 30 of about 389 (126)

Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]

open access: yes, 2022
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Aslam, Muhammad Saqlain   +5 more
core   +1 more source

[Retracted] A Review of Motion Vector‐Based Video Steganography

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Steganography is a popular research direction in the field of information security. Due to the widespread use of video media, video steganography has received much attention from the research community. Among video steganography, motion vector (MV)‐based video steganography has become one of the critical concerns of researchers due to its large ...
Jun Li   +4 more
wiley   +1 more source

Coverless Steganography Based on Low Similarity Feature Selection in DCT Domain [PDF]

open access: yesRadioengineering, 2023
Coverless image steganography typically extracts feature sequences from cover images to map information. Once the extracted features have high similarity, it is challenging to construct a complete mapping sequence set, which places a heavy burden on the ...
L. Tan, J. Liu, Y. Zhou, R. Chen
doaj  

An Improved Privacy Protection Algorithm for Multimodal Data Fusion

open access: yesScientific Programming, Volume 2022, Issue 1, 2022., 2022
With the rapid development of Internet technology, the use and sharing of data have brought great opportunities and challenges to mankind. On the one hand, the development of data sharing and analysis technology has promoted the improvement of economic and social benefits.
Z. F. Chen   +6 more
wiley   +1 more source

Coverless image steganography based on DenseNet feature mapping

open access: yesEURASIP Journal on Image and Video Processing, 2020
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu   +4 more
doaj   +1 more source

Coverless Steganography Based on Motion Analysis of Video

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed.
Yun Tan   +5 more
wiley   +1 more source

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

A High Secured Steganalysis using QVDHC Model [PDF]

open access: yes, 2022
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression.
Akki, Praveena   +4 more
core   +3 more sources

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley   +1 more source

Stone Painting Generative Information Hiding Method Through Triangulation and Bezier Curves [PDF]

open access: yesJisuanji gongcheng
Unlike natural carrier-based coverless information hiding, non-natural carrier-based coverless information hiding does not attempt to generate or utilize natural carriers to hide secret information, which can fundamentally avoid the discrimination ...
REN Zhiyi, SHAO Liping
doaj   +1 more source

Home - About - Disclaimer - Privacy