Results 21 to 30 of about 324 (135)
Hyper Coupled Map Lattices for Hiding Multiple Images
The concept of a hyper coupled map lattice (CML) is presented in this paper. The complexity of the lattice is increased not by adding another spatial dimension of the lattice but by replacing scalar nodal variables by multidimensional square matrices of iterative variables.
Rasa Smidtaite +4 more
wiley +1 more source
Abstract Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image‐based information hiding has been a significantly important topic for digital forensics. Here, active image deep steganographic approaches have come forward for hiding data.
Abdullah Ayub Khan +6 more
wiley +1 more source
Steganography is the task of concealing a message within an overt medium such that the presence of the hidden message is barely detectable. Recently, myriads of works have introduced the inchoate techniques of deep learning to the field of steganography.
He Zhu, Dianbo Liu
doaj +1 more source
A Novel Coverless Text Steganographic Algorithm Based on Polynomial Encryption
Aiming at the problems of low text utilization rate and ambiguity of secret information extraction in the “tag + keyword” coverless information hiding methods, we propose a coverless information hiding method of Chinese text based on polynomial encryption in this paper.
Bo Guan +3 more
wiley +1 more source
A SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY [PDF]
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID technology that has already been proposed by other researchers.
Nhapi, Lincoln, Phiri, Misheck
core +2 more sources
[Retracted] A Review of Motion Vector‐Based Video Steganography
Steganography is a popular research direction in the field of information security. Due to the widespread use of video media, video steganography has received much attention from the research community. Among video steganography, motion vector (MV)‐based video steganography has become one of the critical concerns of researchers due to its large ...
Jun Li +4 more
wiley +1 more source
An Improved Privacy Protection Algorithm for Multimodal Data Fusion
With the rapid development of Internet technology, the use and sharing of data have brought great opportunities and challenges to mankind. On the one hand, the development of data sharing and analysis technology has promoted the improvement of economic and social benefits.
Z. F. Chen +6 more
wiley +1 more source
Coverless Steganography Based on Low Similarity Feature Selection in DCT Domain [PDF]
Coverless image steganography typically extracts feature sequences from cover images to map information. Once the extracted features have high similarity, it is challenging to construct a complete mapping sequence set, which places a heavy burden on the ...
L. Tan, J. Liu, Y. Zhou, R. Chen
doaj
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley +1 more source
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources

