Analyzing Cross-domain Transportation Big Data of New York City with Semi-supervised and Active Learning [PDF]
The majority of big data analytics applied to transportation datasets suffer from being too domain-specific, that is, they draw conclusions for a dataset based on analytics on the same dataset. This makes models trained from one domain (e.g.
Huiyu Sun, Suzanne McIntosh
core +2 more sources
Defining Embedding Distortion for Intra Prediction Mode-Based Video Steganography [PDF]
In this paper, an effective intra prediction mode-based video strganography is proposed. Secret messages are embedded during the intra prediction of the video encoding without causing large embedding impact.
Bingwen Feng +3 more
core +2 more sources
Comparative Performance Analysis Of Deep Learning-Based Image Steganography Using U-Net, V-Net, And U-Net++ Encoders [PDF]
Digital Imaging steganography is the act of hiding information in a cover picture in a way that can't be found or recovered. Three main types of methods are used in digital image steganography: neural network methods, spatial methods, and transform ...
Dr. Varsha Jotwani, Sapna Kaneria
core +2 more sources
A GLCM-Feature-Based Approach for Reversible Image Transformation [PDF]
Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret ...
Haidong Zhong, Xianyi Chen, Zhifeng Bao
core +2 more sources
Diffusion-Based Hierarchical Image Steganography
This paper introduces Hierarchical Image Steganography, a novel method that enhances the security and capacity of embedding multiple images into a single container using diffusion models.
Meng, Xiandong +5 more
core
Regulation by Generalization [PDF]
"Where there's smoke, there's fire"' says a venerable adage that informs many of our everyday decisions. Although what looks like smoke may have a cause other than fire, smoke is so often the indicator of fire that it is rarely a bad strategy to presume ...
Schauer, Frederick +1 more
core +1 more source
DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models
Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image.
Gao, Zhongpai +7 more
core
A Robust Text Coverless Information Hiding Based on Multi-Index Method
Lin Xiang +4 more
openaire +1 more source
Deep Learning for Real-time Information Hiding and Forensics [PDF]
C. Kim, C. Yang, S. Cimato, Z. Zhou
core
A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory
Kurnia Anggriani +3 more
openaire +1 more source

