Results 1 to 10 of about 82 (72)

Coverless Image Steganography Based on Generative Adversarial Network [PDF]

open access: yesMathematics, 2020
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin   +5 more
doaj   +2 more sources

Robust coverless steganography using limited mapping images

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Coverless image steganography (CIS) has attracted significant attention because it can fundamentally resist steganalysis tools. Available CIS schemes are mainly divided into synthesis-based and mapping-based schemes.
Xiyao Liu   +5 more
doaj   +2 more sources

Coverless image steganography based on DenseNet feature mapping [PDF]

open access: yesEURASIP Journal on Image and Video Processing, 2020
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) methods achieve excellent robustness under non-
Qiang Liu   +4 more
doaj   +2 more sources

Coverless Image Steganography: A Survey

open access: yesIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +2 more sources

Coverless VoIP Steganography Using Hash and Hash

open access: yesCybernetics and Information Technologies, 2020
Performing secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge. This paper aims on hiding the secret data bits in the voice packets without modifying any data in the cover ...
Deepikaa S., Saravanan R.
doaj   +2 more sources

Enhanced classification prostate cancer based on generative adversarial networks and integrated deep learning with vision transformer models. [PDF]

open access: yesSci Rep
By eliminating the need to alter the source images, this paper introduces a secure technique for coverless image steganography that strengthens defense against steganalysis attacks.
Salama WM, Aly MH.
europepmc   +2 more sources

A Coverless Plain Text Steganography Based on Character Features [PDF]

open access: yesIEEE Access, 2019
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj   +2 more sources

A coverless steganography method based on generative adversarial network [PDF]

open access: yesEURASIP Journal on Image and Video Processing, 2020
The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of coverless information hiding.
Xintao Duan   +4 more
doaj   +2 more sources

Coverless Steganography for Face Recognition Based on Diffusion Model

open access: yesIEEE Access
As a highly recognizable biometric face recognition technology, it has been widely used in many identity verification systems. In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information ...
Yuan Guo, Ziqi Liu
doaj   +2 more sources

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning

open access: yesIEEE Access, 2021
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy