Results 31 to 40 of about 118 (105)
Coverless Image Steganography Method Based on Feature Selection
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu +4 more
openaire +1 more source
A Heuristic Model for Supporting Users’ Decision‐Making in Privacy Disclosure for Recommendation
Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high‐quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to ...
Hongchen Wu +4 more
wiley +1 more source
Generative steganography method based on auto-generation of contours
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU +4 more
doaj +2 more sources
VidaGAN: Adaptive GAN for image steganography
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi +2 more
wiley +1 more source
Coverless Video Steganography based on Maximum DC Coefficients
Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography.
Meng, Laijin +4 more
openaire +2 more sources
An Adaptive Audio Steganography for Covert Wireless Communication
In recent years, the wide applications of the wireless sensor networks have achieved great success. However, the security is a critical issue in many scenarios ranging from covert military operations to the organization of the social unrest. Because the traditional encrypting methods are easy to arouse suspicion, an adaptive audio steganography method ...
Guojiang Xin +4 more
wiley +1 more source
A Robust joint coverless image steganography scheme based on two independent modules
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj +1 more source
AI‐generated video steganography based on semantic segmentation
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin +4 more
wiley +1 more source
Hiding image into image with hybrid attention mechanism based on GANs
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu +3 more
wiley +1 more source
SIHNet: A safe image hiding method with less information leaking
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng +5 more
wiley +1 more source

