Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu +6 more
core +2 more sources
Novel linguistic steganography based on character-level text generation [PDF]
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic steganographic methods may suffer from the low embedding capacity problem.
Li, Q, Liu, Y, Xiang, L, Yang, S, Zhu, C
core +1 more source
End-to-end image steganography using deep convolutional autoencoders [PDF]
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S +4 more
core +2 more sources
A Fusion Steganographic Algorithm Based on Faster R-CNN [PDF]
The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media.
Jin Wang +3 more
core +2 more sources
Generative steganography method based on auto-generation of contours
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU +4 more
doaj +2 more sources
Coverless Image Steganography: A Survey
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin +4 more
doaj +1 more source
An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction [PDF]
Рассматривается адаптивный алгоритм стеганографического скрытия информации, основанный на итеративном внесении малозначительных искажений в блоки полноцветных изображений-контейнеров и использующий быстродействующие некриптографические хеш-функции для ...
Дрюченко, М.А.
core +1 more source
New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core +2 more sources
Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network [PDF]
Deep neural network has proven to be very effective in computer vision fields. Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing ...
Chuanlong Li +2 more
core +2 more sources
Coverless information hiding based on Generative Model
4 pages,7 ...
Duan, Xintao, Song, Haoxian
openaire +2 more sources

