Results 41 to 50 of about 389 (126)

Coverless information hiding based on Generative Model

open access: yes, 2018
4 pages,7 ...
Duan, Xintao, Song, Haoxian
openaire   +2 more sources

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: yesJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +1 more source

Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]

open access: yes, 2018
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core   +2 more sources

An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction [PDF]

open access: yes, 2023
Рассматривается адаптивный алгоритм стеганографического скрытия информации, основанный на итеративном внесении малозначительных искажений в блоки полноцветных изображений-контейнеров и использующий быстродействующие некриптографические хеш-функции для ...
Дрюченко, М.А.
core   +1 more source

Coverless Multi-keywords Information Hiding Method Based on Text

open access: yesInternational Journal of Security and Its Applications, 2016
As a new information hiding method, coverless information hiding has become a hot issue in the field of information security. The existing coverless information hiding method can hide only one Chinese character in each natural text. However, the problem of the method is that the hiding capacity is too small.
Zhili Zhou   +3 more
openaire   +1 more source

A Coverless Plain Text Steganography Based on Character Features

open access: yesIEEE Access, 2019
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj   +1 more source

A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]

open access: yes
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core   +2 more sources

STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN [PDF]

open access: yes, 2022
Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where ...
Febrian, Ibnu   +3 more
core   +1 more source

An Efficient Light-weight LSB steganography with Deep learning Steganalysis

open access: yes, 2022
Active research is going on to securely transmit a secret message or so-called steganography by using data-hiding techniques in digital images. After assessing the state-of-the-art research work, we found, most of the existing solutions are not promising
Das, Dipnarayan   +2 more
core   +1 more source

Coverless Information Hiding Based on Generative adversarial networks

open access: yes, 2017
arXiv admin note: text overlap with arXiv:1703.05502 by other ...
Liu, Ming-ming   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy