A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix [PDF]
In this paper, a coverless information hiding algorithm is introduced. In which, the grayscale gradient co-occurrence matrix is used to encode images and the mapping relationship between the images...
Jianbin Wu +5 more
openaire +1 more source
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent ...
Jiaohua Qin +4 more
openaire +2 more sources
Electronic Structure and Physical Characteristics of Dioxin Under External Electric Field [PDF]
Dioxin is a highly toxic and caustic substance, which widely existed in the atmosphere, soil and water with tiny particles. Dioxin pollution has become a major problem that concerns the survival of mankind, which must be strictly controlled.
Bumaliya Abulimiti +6 more
core +2 more sources
Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
As an emerging concept, steganography without embedding (SWE) hides a secret message without directly embedding it into a cover. Thus, SWE has the unique advantage of being immune to typical steganalysis methods and can better protect the secret message ...
Lin, Yu +5 more
core
Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman +8 more
core +2 more sources
Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca +3 more
core +1 more source
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security risks. To overcome
Sahar A. El-Rahman +5 more
doaj +1 more source
A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the most significant bit of the cover image (CIHMSB), has been developed.
Kurnia Anggriani +3 more
openaire +1 more source
A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen +3 more
core +2 more sources
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia +5 more
core

