Results 31 to 40 of about 324 (135)

A High Secured Steganalysis using QVDHC Model [PDF]

open access: yes, 2022
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression.
Akki, Praveena   +4 more
core   +3 more sources

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao   +5 more
wiley   +1 more source

Coverless Steganography for Digital Images Based on a Generative Model [PDF]

open access: yes, 2018
In this paper, we propose a novel coverless image steganographic scheme based on a generative model. In our scheme, the secret image is first fed to the generative model database, to generate a meaning-normal and independent image different from the ...
Chuan Qin   +3 more
core   +2 more sources

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: yesJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +1 more source

A video coverless information hiding algorithm based on semantic segmentation

open access: yesEURASIP Journal on Image and Video Processing, 2020
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan   +4 more
doaj   +1 more source

Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]

open access: yes, 2018
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu   +6 more
core   +2 more sources

End-to-end image steganography using deep convolutional autoencoders [PDF]

open access: yes, 2021
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S   +4 more
core   +2 more sources

Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]

open access: yes, 2018
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao   +3 more
core   +2 more sources

An adaptive image steganography algorithm based on the use of non-cryptographic hash functions for data extraction [PDF]

open access: yes, 2023
Рассматривается адаптивный алгоритм стеганографического скрытия информации, основанный на итеративном внесении малозначительных искажений в блоки полноцветных изображений-контейнеров и использующий быстродействующие некриптографические хеш-функции для ...
Дрюченко, М.А.
core   +1 more source

A Novel Steganography Scheme Combining Coverless Information Hiding and Steganography

open access: yesJournal of Information Hiding and Privacy Protection, 2019
At present, the coverless information hiding has been developed. However, due to the limited mapping relationship between secret information and feature selection, it is challenging to further enhance the hiding capacity of coverless information hiding.
Ruohan Meng   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy