Analyzing Cross-domain Transportation Big Data of New York City with Semi-supervised and Active Learning [PDF]
The majority of big data analytics applied to transportation datasets suffer from being too domain-specific, that is, they draw conclusions for a dataset based on analytics on the same dataset. This makes models trained from one domain (e.g.
Huiyu Sun, Suzanne McIntosh
core +2 more sources
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia +5 more
core
A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen +3 more
core +2 more sources
Defining Embedding Distortion for Intra Prediction Mode-Based Video Steganography [PDF]
In this paper, an effective intra prediction mode-based video strganography is proposed. Secret messages are embedded during the intra prediction of the video encoding without causing large embedding impact.
Bingwen Feng +3 more
core +2 more sources
Comparative Performance Analysis Of Deep Learning-Based Image Steganography Using U-Net, V-Net, And U-Net++ Encoders [PDF]
Digital Imaging steganography is the act of hiding information in a cover picture in a way that can't be found or recovered. Three main types of methods are used in digital image steganography: neural network methods, spatial methods, and transform ...
Dr. Varsha Jotwani, Sapna Kaneria
core +2 more sources
A GLCM-Feature-Based Approach for Reversible Image Transformation [PDF]
Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret ...
Haidong Zhong, Xianyi Chen, Zhifeng Bao
core +2 more sources
Reversible data hiding with selective bits difference expansion and modulus function [PDF]
The integration of the internet of things (IoT) has significantly enhanced human life but also raises concerns about information security and privacy. Information security can be achieved through cryptography, which encrypts data to make it unreadable ...
Arham, Aulia +2 more
core +2 more sources
Diffusion-Based Hierarchical Image Steganography
This paper introduces Hierarchical Image Steganography, a novel method that enhances the security and capacity of embedding multiple images into a single container using diffusion models.
Meng, Xiandong +5 more
core
Regulation by Generalization [PDF]
"Where there's smoke, there's fire"' says a venerable adage that informs many of our everyday decisions. Although what looks like smoke may have a cause other than fire, smoke is so often the indicator of fire that it is rarely a bad strategy to presume ...
Schauer, Frederick +1 more
core +1 more source
DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models
Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image.
Gao, Zhongpai +7 more
core

