Results 31 to 40 of about 118 (105)

Coverless Image Steganography Method Based on Feature Selection

open access: yesJournal of Information Hiding and Privacy Protection, 2019
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu   +4 more
openaire   +1 more source

A Heuristic Model for Supporting Users’ Decision‐Making in Privacy Disclosure for Recommendation

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high‐quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to ...
Hongchen Wu   +4 more
wiley   +1 more source

Generative steganography method based on auto-generation of contours

open access: yesTongxin xuebao, 2021
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU   +4 more
doaj   +2 more sources

VidaGAN: Adaptive GAN for image steganography

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3329-3342, 16 October 2024.
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi   +2 more
wiley   +1 more source

Coverless Video Steganography based on Maximum DC Coefficients

open access: yes, 2020
Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography.
Meng, Laijin   +4 more
openaire   +2 more sources

An Adaptive Audio Steganography for Covert Wireless Communication

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
In recent years, the wide applications of the wireless sensor networks have achieved great success. However, the security is a critical issue in many scenarios ranging from covert military operations to the organization of the social unrest. Because the traditional encrypting methods are easy to arouse suspicion, an adaptive audio steganography method ...
Guojiang Xin   +4 more
wiley   +1 more source

A Robust joint coverless image steganography scheme based on two independent modules

open access: yesCybersecurity
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj   +1 more source

AI‐generated video steganography based on semantic segmentation

open access: yesIET Image Processing, Volume 18, Issue 11, Page 3042-3054, 18 September 2024.
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin   +4 more
wiley   +1 more source

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2679-2689, 21 August 2024.
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu   +3 more
wiley   +1 more source

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2800-2815, 21 August 2024.
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy