Results 61 to 70 of about 389 (126)

AI‐generated video steganography based on semantic segmentation

open access: yesIET Image Processing, Volume 18, Issue 11, Page 3042-3054, 18 September 2024.
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin   +4 more
wiley   +1 more source

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2679-2689, 21 August 2024.
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu   +3 more
wiley   +1 more source

A Big Data Text Coverless Information Hiding Based on Topic Distribution and TF-IDF

open access: yesInternational Journal of Digital Crime and Forensics, 2021
Coverless information hiding has become a hot topic in recent years. The existing steganalysis tools are invalidated due to coverless steganography without any modification to the carrier. However, for the text coverless has relatively low hiding capacity, this paper proposed a big data text coverless information hiding method based on LDA (latent ...
Jiaohua Qin   +4 more
openaire   +2 more sources

Electronic Structure and Physical Characteristics of Dioxin Under External Electric Field [PDF]

open access: yes, 2018
Dioxin is a highly toxic and caustic substance, which widely existed in the atmosphere, soil and water with tiny particles. Dioxin pollution has become a major problem that concerns the survival of mankind, which must be strictly controlled.
Bumaliya Abulimiti   +6 more
core   +2 more sources

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2800-2815, 21 August 2024.
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng   +5 more
wiley   +1 more source

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding

open access: yes, 2023
As an emerging concept, steganography without embedding (SWE) hides a secret message without directly embedding it into a cover. Thus, SWE has the unique advantage of being immune to typical steganalysis methods and can better protect the secret message ...
Lin, Yu   +5 more
core  

Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]

open access: yes, 2018
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman   +8 more
core   +2 more sources

A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features

open access: yesSecurity and Communication Networks, Volume 2024, Issue 1, 2024.
With the advancement of image steganography, coverless image steganography has gained widespread attention due to its ability to hide information without modifying the carrier of images. However, existing coverless image steganography methods often require both communicating parties to transmit an amount of additional information including image blocks’
Fan Li   +5 more
wiley   +1 more source

C-HIDE: A Steganographic Framework for Robust Data Hiding and Advanced Security Using Coverless Hybrid Image Encryption With AES and ECC

open access: yesIEEE Access
Coverless image steganography conceals information without modifying the carrier image, addressing vulnerabilities in traditional methods. However, existing approaches often require transmitting metadata, raising suspicion and security risks. To overcome
Sahar A. El-Rahman   +5 more
doaj   +1 more source

Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]

open access: yes, 2023
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy