Results 71 to 80 of about 389 (126)

Analyzing Cross-domain Transportation Big Data of New York City with Semi-supervised and Active Learning [PDF]

open access: yes, 2018
The majority of big data analytics applied to transportation datasets suffer from being too domain-specific, that is, they draw conclusions for a dataset based on analytics on the same dataset. This makes models trained from one domain (e.g.
Huiyu Sun, Suzanne McIntosh
core   +2 more sources

Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

open access: yes, 2021
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia   +5 more
core  

A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]

open access: yes, 2019
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen   +3 more
core   +2 more sources

Defining Embedding Distortion for Intra Prediction Mode-Based Video Steganography [PDF]

open access: yes, 2018
In this paper, an effective intra prediction mode-based video strganography is proposed. Secret messages are embedded during the intra prediction of the video encoding without causing large embedding impact.
Bingwen Feng   +3 more
core   +2 more sources

Comparative Performance Analysis Of Deep Learning-Based Image Steganography Using U-Net, V-Net, And U-Net++ Encoders [PDF]

open access: yes
Digital Imaging steganography is the act of hiding information in a cover picture in a way that can't be found or recovered. Three main types of methods are used in digital image steganography: neural network methods, spatial methods, and transform ...
Dr. Varsha Jotwani, Sapna Kaneria
core   +2 more sources

A GLCM-Feature-Based Approach for Reversible Image Transformation [PDF]

open access: yes
Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret ...
Haidong Zhong, Xianyi Chen, Zhifeng Bao
core   +2 more sources

Reversible data hiding with selective bits difference expansion and modulus function [PDF]

open access: yes
The integration of the internet of things (IoT) has significantly enhanced human life but also raises concerns about information security and privacy. Information security can be achieved through cryptography, which encrypts data to make it unreadable ...
Arham, Aulia   +2 more
core   +2 more sources

Diffusion-Based Hierarchical Image Steganography

open access: yes
This paper introduces Hierarchical Image Steganography, a novel method that enhances the security and capacity of embedding multiple images into a single container using diffusion models.
Meng, Xiandong   +5 more
core  

Regulation by Generalization [PDF]

open access: yes
"Where there's smoke, there's fire"' says a venerable adage that informs many of our everyday decisions. Although what looks like smoke may have a cause other than fire, smoke is so often the indicator of fire that it is rarely a bad strategy to presume ...
Schauer, Frederick   +1 more
core   +1 more source

DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models

open access: yes
Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image.
Gao, Zhongpai   +7 more
core  

Home - About - Disclaimer - Privacy