Adaptive network steganography using deep learning and multimedia video analysis for enhanced security and fidelity. [PDF]
Han C, Xue T.
europepmc +1 more source
Coverless Image Steganography Based on Jigsaw Puzzle Image Generation
Al Hussien Seddik Saad +2 more
openaire +1 more source
Image steganography without embedding by carrier secret information for secure communication in networks. [PDF]
Zhang Y +5 more
europepmc +1 more source
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review. [PDF]
Apau R +4 more
europepmc +1 more source
Image steganalysis using active learning and hyperparameter optimization. [PDF]
Bohang L +9 more
europepmc +1 more source
Related searches:
A Robust Coverless Steganography Scheme Using Camouflage Image
IEEE Transactions on Circuits and Systems for Video Technology, 2022Recently, most coverless image steganography (CIS) methods are based on robust mapping rules. However, due to the limited mapping expression relationship between secret information and hash sequence, it is a challenge to further improve the hiding ability of coverless information hiding.
Qiang Liu +4 more
openaire +1 more source
Coverless Image Steganography Based on Multi-Object Recognition
IEEE Transactions on Circuits and Systems for Video Technology, 2021Most of the existing coverless steganography approaches have poor robustness to geometric attacks, because these approaches use features of the entire image to map information, and these features are easy to be lost when being attacked. In order to improve the robustness against geometric attacks, we propose a coverless image steganography method based
Yuanjing Luo +3 more
openaire +1 more source
Coverless Image Steganography using Haar Integer Wavelet Transform
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), 2020Coverless hnage steganography is a recently discovered steganography method Which does not modify the image carrying the secret information. However, the techniques proposed until now have low efficiency capable of transferring few bits per image. This paper focuses on increasing the amount of data transmitted in an image, when using coverless image ...
Vivek Govindasamy +2 more
openaire +1 more source
Coverless Image Steganography Without Embedding
2015The traditional image steganography technologies designate a cover image and embed secret data into it to form the stego-image. However, the modification traces caused by the embedding will be left in the cover image, which makes successful steganalysis possible.
Zhili Zhou +4 more
openaire +1 more source
Coverless image steganography using partial-duplicate image retrieval
Soft Computing, 2018Most of the existing image steganographic approaches embed the secret information imperceptibly into a cover image by slightly modifying its content. However, the modification traces will cause some distortion in the stego-image, especially when embedding color image data that usually contain thousands of bits, which makes successful steganalysis ...
Zhili Zhou, Yan Mu, Q. M. Jonathan Wu
openaire +1 more source

