Results 41 to 50 of about 385 (138)

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: yesJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +1 more source

Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]

open access: yes, 2018
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core   +2 more sources

STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN [PDF]

open access: yes, 2022
Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where ...
Febrian, Ibnu   +3 more
core   +1 more source

Coverless Multi-keywords Information Hiding Method Based on Text

open access: yesInternational Journal of Security and Its Applications, 2016
As a new information hiding method, coverless information hiding has become a hot issue in the field of information security. The existing coverless information hiding method can hide only one Chinese character in each natural text. However, the problem of the method is that the hiding capacity is too small.
Zhili Zhou   +3 more
openaire   +1 more source

A Coverless Plain Text Steganography Based on Character Features

open access: yesIEEE Access, 2019
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj   +1 more source

A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]

open access: yes
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core   +2 more sources

An Efficient Light-weight LSB steganography with Deep learning Steganalysis

open access: yes, 2022
Active research is going on to securely transmit a secret message or so-called steganography by using data-hiding techniques in digital images. After assessing the state-of-the-art research work, we found, most of the existing solutions are not promising
Das, Dipnarayan   +2 more
core   +1 more source

Coverless Information Hiding Based on Generative adversarial networks

open access: yes, 2017
arXiv admin note: text overlap with arXiv:1703.05502 by other ...
Liu, Ming-ming   +4 more
openaire   +2 more sources

An Electronic Lattice Construction Method Based on Game Padding

open access: yesIEEE Access, 2019
The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity ...
Congfei Sun, Kaixi Wang
doaj   +1 more source

A Heuristic Model for Supporting Users’ Decision‐Making in Privacy Disclosure for Recommendation

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high‐quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to ...
Hongchen Wu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy