Results 51 to 60 of about 385 (138)
IMPROVED COVERLESS INFORMATION HIDING UTILIZING GENERATIVE MODELS
The submitted algorithm increased data-hiding capacity, extended capability, and improved quality of the reconstructed secret image as compared with traditional steganography and existing coverless information-hiding methods.
Zainab Hdeib Al-Shably
doaj +1 more source
VidaGAN: Adaptive GAN for image steganography
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi +2 more
wiley +1 more source
An Adaptive Audio Steganography for Covert Wireless Communication
In recent years, the wide applications of the wireless sensor networks have achieved great success. However, the security is a critical issue in many scenarios ranging from covert military operations to the organization of the social unrest. Because the traditional encrypting methods are easy to arouse suspicion, an adaptive audio steganography method ...
Guojiang Xin +4 more
wiley +1 more source
AI‐generated video steganography based on semantic segmentation
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin +4 more
wiley +1 more source
Hiding image into image with hybrid attention mechanism based on GANs
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu +3 more
wiley +1 more source
Coverless Information Hiding Based onDeep Learning Approach:Review
The proliferation of digitalization in the realm of information has paved the way for numerous types of multimedia data to be attacked. Hence, the security of information has become a critical concern. Over the years, image steganography has been widely acknowledged as one of the most effective techniques for securing confidential ...
Zainab Hdeib Al-Shably +1 more
openaire +1 more source
SIHNet: A safe image hiding method with less information leaking
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng +5 more
wiley +1 more source
Text hiding in text using invisible character [PDF]
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples.
Mustafa, Nada Abdul Aziz
core +3 more sources
A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography
At present, the coverless information hiding has been developed. However, due to the limited mapping relationship between secret information and feature selection, it is challenging to further enhance the hiding capacity of coverless information hiding.
Ruohan Meng +4 more
openaire +1 more source
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’
Fan Li +5 more
wiley +1 more source

