Results 41 to 50 of about 324 (135)

Novel linguistic steganography based on character-level text generation [PDF]

open access: yes, 2020
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic steganographic methods may suffer from the low embedding capacity problem.
Li, Q, Liu, Y, Xiang, L, Yang, S, Zhu, C
core   +1 more source

A Fusion Steganographic Algorithm Based on Faster R-CNN [PDF]

open access: yes, 2018
The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media.
Jin Wang   +3 more
core   +2 more sources

New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]

open access: yes, 2023
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core   +2 more sources

STBS-Stega: Coverless text steganography based on state transition-binary sequence

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient ...
Ning Wu   +6 more
doaj   +1 more source

Text coverless information hiding method based on synonyms expansion and label delivery mechanism [PDF]

open access: yes, 2021
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Guohua WU   +5 more
core   +1 more source

STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN [PDF]

open access: yes, 2022
Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where ...
Febrian, Ibnu   +3 more
core   +1 more source

Image Steganography: A Review of the Recent Advances [PDF]

open access: yes, 2021
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Al-Maadeed, Somaya   +3 more
core   +2 more sources

Embedding Image Through Generated Intermediate Medium Using Deep Convolutional Generative Adversarial Network [PDF]

open access: yes, 2018
Deep neural network has proven to be very effective in computer vision fields. Deep convolutional network can learn the most suitable features of certain images without specific measure functions and outperform lots of traditional image processing ...
Chuanlong Li   +2 more
core   +2 more sources

New text steganography method using the arabic letters dots [PDF]

open access: yes, 2021
With the increasing technological and electronic development, methods have been developed to hide important information using text steganography as a new technology, since it is not noticeable and easy to send and receive.
Ahmed Adeeb, Omer F.   +2 more
core   +3 more sources

An Efficient Light-weight LSB steganography with Deep learning Steganalysis

open access: yes, 2022
Active research is going on to securely transmit a secret message or so-called steganography by using data-hiding techniques in digital images. After assessing the state-of-the-art research work, we found, most of the existing solutions are not promising
Das, Dipnarayan   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy