Results 11 to 20 of about 324 (135)

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning

open access: yesIEEE Access, 2021
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad   +2 more
doaj   +3 more sources

Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Yung-Hui Li   +5 more
doaj   +2 more sources

A Coverless Audio Steganography Based on Generative Adversarial Networks

open access: yesElectronics, 2023
Traditional audio steganography by cover modification causes changes to the cover features during the embedding of a secret, which is easy to detect with emerging neural-network steganalysis tools. To address the problem, this paper proposes a coverless audio-steganography model to conceal a secret audio.
Jing Li, Kaixi Wang, Xiaozhu Jia
openaire   +3 more sources

Coverless Steganography for Face Recognition Based on Diffusion Model

open access: yesIEEE Access
As a highly recognizable biometric face recognition technology, it has been widely used in many identity verification systems. In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information ...
Yuan Guo, Ziqi Liu
doaj   +2 more sources

Coverless Image Steganography: Review

open access: yesAcademic Journal of Nawroz University, 2022
Many of the existing image steganographic techniques embed secret information into cover images by slightly altering their contents. These modifications have several effects, on the other hand, Stego-images distorted by these problems become vulnerable to steganalysis tools. Coverless information hiding represents a solution to this problem.
Shler Farhad Khorshid   +1 more
openaire   +1 more source

Enhancing of coverless image steganography capacity based on image block features [PDF]

open access: yes, 2023
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
A. Ali, Suhad   +2 more
core   +2 more sources

Securing Messages by Using Coverless Steganography : A Survey [PDF]

open access: yes, 2022
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core   +2 more sources

A coverless image steganography based on robust image wavelet hashing [PDF]

open access: yes, 2022
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Ali, Suhad A.   +2 more
core   +2 more sources

Review on feature-based method performance in text steganography [PDF]

open access: yes, 2021
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi   +4 more
core   +3 more sources

Steganographic secret sharing via AI-generated photorealistic images

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Steganographic secret sharing is an access control technique that transforms a secret message into multiple shares in a steganographic sense. Each share is in a human-readable format in order to dispel suspicion from a malicious party during transmission
Kai Gao   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy