Results 31 to 40 of about 389 (126)

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao   +5 more
wiley   +1 more source

Coverless Steganography for Digital Images Based on a Generative Model [PDF]

open access: yes, 2018
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin   +3 more
core   +2 more sources

Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]

open access: yes, 2018
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu   +6 more
core   +2 more sources

Novel linguistic steganography based on character-level text generation [PDF]

open access: yes, 2020
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic steganographic methods may suffer from the low embedding capacity problem.
Li, Q, Liu, Y, Xiang, L, Yang, S, Zhu, C
core   +1 more source

A Fusion Steganographic Algorithm Based on Faster R-CNN [PDF]

open access: yes, 2018
The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media.
Jin Wang   +3 more
core   +2 more sources

End-to-end image steganography using deep convolutional autoencoders [PDF]

open access: yes, 2021
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S   +4 more
core   +2 more sources

Generative steganography method based on auto-generation of contours

open access: yesTongxin xuebao, 2021
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU   +4 more
doaj   +2 more sources

Coverless Image Steganography: A Survey

open access: yesIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +1 more source

New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]

open access: yes, 2023
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core   +2 more sources

Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network [PDF]

open access: yes, 2018
Deep neural network has proven to be very effective in computer vision fields. Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing ...
Chuanlong Li   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy