Results 61 to 70 of about 385 (138)

A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix [PDF]

open access: yesIETE Technical Review, 2018
In this paper, a coverless information hiding algorithm is introduced. In which, the grayscale gradient co-occurrence matrix is used to encode images and the mapping relationship between the images...
Jianbin Wu   +5 more
openaire   +1 more source

A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF

open access: yesInternational Journal of Digital Crime and Forensics, 2021
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent ...
Jiaohua Qin   +4 more
openaire   +2 more sources

Electronic Structure and Physical Characteristics of Dioxin Under External Electric Field [PDF]

open access: yes, 2018
Dioxin is a highly toxic and caustic substance, which widely existed in the atmosphere, soil and water with tiny particles. Dioxin pollution has become a major problem that concerns the survival of mankind, which must be strictly controlled.
Bumaliya Abulimiti   +6 more
core   +2 more sources

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

open access: yes, 2023
As an emerging concept, steganography without embedding (SWE) hides a secret message without directly embedding it into a cover. Thus, SWE has the unique advantage of being immune to typical steganalysis methods and can better protect the secret message ...
Lin, Yu   +5 more
core  

Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]

open access: yes, 2018
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman   +8 more
core   +2 more sources

Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]

open access: yes, 2023
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca   +3 more
core   +1 more source

C-HIDE: A Steganographic Framework for Robust Data Hiding and Advanced Security Using Coverless Hybrid Image Encryption With AES and ECC

open access: yesIEEE Access
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security risks. To overcome
Sahar A. El-Rahman   +5 more
doaj   +1 more source

A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments

open access: yesElectronics, 2023
Coverless data hiding is resistant to steganalytical tool attacks because a stego image is not altered. On the other hand, one of its flaws is its limited hiding capacity. Recently, a coverless data-hiding method, known as the coverless information-hiding method based on the most significant bit of the cover image (CIHMSB), has been developed.
Kurnia Anggriani   +3 more
openaire   +1 more source

A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]

open access: yes, 2019
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen   +3 more
core   +2 more sources

Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

open access: yes, 2021
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia   +5 more
core  

Home - About - Disclaimer - Privacy