Results 51 to 60 of about 118 (105)

Coverless Image Steganography Based on Jigsaw Puzzle Image Generation

open access: yesComputers, Materials & Continua, 2021
Al Hussien Seddik Saad   +2 more
openaire   +1 more source

Image steganalysis using active learning and hyperparameter optimization. [PDF]

open access: yesSci Rep
Bohang L   +9 more
europepmc   +1 more source

A Robust Coverless Steganography Scheme Using Camouflage Image

IEEE Transactions on Circuits and Systems for Video Technology, 2022
Recently, most coverless image steganography (CIS) methods are based on robust mapping rules. However, due to the limited mapping expression relationship between secret information and hash sequence, it is a challenge to further improve the hiding ability of coverless information hiding.
Qiang Liu   +4 more
openaire   +1 more source

Coverless Image Steganography Based on Multi-Object Recognition

IEEE Transactions on Circuits and Systems for Video Technology, 2021
Most of the existing coverless steganography approaches have poor robustness to geometric attacks, because these approaches use features of the entire image to map information, and these features are easy to be lost when being attacked. In order to improve the robustness against geometric attacks, we propose a coverless image steganography method based
Yuanjing Luo   +3 more
openaire   +1 more source

Coverless Image Steganography using Haar Integer Wavelet Transform

2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), 2020
Coverless hnage steganography is a recently discovered steganography method Which does not modify the image carrying the secret information. However, the techniques proposed until now have low efficiency capable of transferring few bits per image. This paper focuses on increasing the amount of data transmitted in an image, when using coverless image ...
Vivek Govindasamy   +2 more
openaire   +1 more source

Coverless Image Steganography Without Embedding

2015
The traditional image steganography technologies designate a cover image and embed secret data into it to form the stego-image. However, the modification traces caused by the embedding will be left in the cover image, which makes successful steganalysis possible.
Zhili Zhou   +4 more
openaire   +1 more source

Coverless image steganography using partial-duplicate image retrieval

Soft Computing, 2018
Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis ...
Zhili Zhou, Yan Mu, Q. M. Jonathan Wu
openaire   +1 more source

Home - About - Disclaimer - Privacy