Results 51 to 60 of about 389 (126)

An Electronic Lattice Construction Method Based on Game Padding

open access: yesIEEE Access, 2019
The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity ...
Congfei Sun, Kaixi Wang
doaj   +1 more source

IMPROVED COVERLESS INFORMATION HIDING UTILIZING GENERATIVE MODELS

open access: yesMağallaẗ Al-kūfaẗ Al-handasiyyaẗ
The submitted algorithm increased data-hiding capacity, extended capability, and improved quality of the reconstructed secret image as compared with traditional steganography and existing coverless information-hiding methods.
Zainab Hdeib Al-Shably
doaj   +1 more source

Reinforcement Learning for Robust Modulation Classification in Non‐Orthogonal Multiple Access (NOMA) Systems

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a reinforcement learning–based framework for robust modulation classification and resource management in non‐orthogonal multiple access (NOMA) systems. By integrating Q‐learning, deep reinforcement learning, and proximal policy optimisation, the approach enhances spectral efficiency, mitigates interference, and improves ...
Mohammed M. Alammar   +3 more
wiley   +1 more source

ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley   +1 more source

An Improved Near‐Reversible Technique With Residual Networks

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley   +1 more source

A Heuristic Model for Supporting Users’ Decision‐Making in Privacy Disclosure for Recommendation

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high‐quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to ...
Hongchen Wu   +4 more
wiley   +1 more source

Coverless Information Hiding Based onDeep Learning Approach:Review

open access: yesAl-Furat Journal of Innovations in Electronics and Computer Engineering
The proliferation of digitalization in the realm of information has paved the way for numerous types of multimedia data to be attacked. Hence, the security of information has become a critical concern. Over the years, image steganography has been widely acknowledged as one of the most effective techniques for securing confidential ...
Zainab Hdeib Al-Shably   +1 more
openaire   +1 more source

VidaGAN: Adaptive GAN for image steganography

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3329-3342, 16 October 2024.
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi   +2 more
wiley   +1 more source

An Adaptive Audio Steganography for Covert Wireless Communication

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
In recent years, the wide applications of the wireless sensor networks have achieved great success. However, the security is a critical issue in many scenarios ranging from covert military operations to the organization of the social unrest. Because the traditional encrypting methods are easy to arouse suspicion, an adaptive audio steganography method ...
Guojiang Xin   +4 more
wiley   +1 more source

A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography

open access: yesJournal of Information Hiding and Privacy Protection, 2019
At present, the coverless information hiding has been developed. However, due to the limited mapping relationship between secret information and feature selection, it is challenging to further enhance the hiding capacity of coverless information hiding.
Ruohan Meng   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy