Results 61 to 70 of about 389 (126)
AI‐generated video steganography based on semantic segmentation
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin +4 more
wiley +1 more source
Hiding image into image with hybrid attention mechanism based on GANs
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu +3 more
wiley +1 more source
A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent ...
Jiaohua Qin +4 more
openaire +2 more sources
Electronic Structure and Physical Characteristics of Dioxin Under External Electric Field [PDF]
Dioxin is a highly toxic and caustic substance, which widely existed in the atmosphere, soil and water with tiny particles. Dioxin pollution has become a major problem that concerns the survival of mankind, which must be strictly controlled.
Bumaliya Abulimiti +6 more
core +2 more sources
SIHNet: A safe image hiding method with less information leaking
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng +5 more
wiley +1 more source
Double-Flow-based Steganography without Embedding for Image-to-Image Hiding
As an emerging concept, steganography without embedding (SWE) hides a secret message without directly embedding it into a cover. Thus, SWE has the unique advantage of being immune to typical steganalysis methods and can better protect the secret message ...
Lin, Yu +5 more
core
Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman +8 more
core +2 more sources
A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’
Fan Li +5 more
wiley +1 more source
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security risks. To overcome
Sahar A. El-Rahman +5 more
doaj +1 more source
Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca +3 more
core +1 more source

