Results 51 to 60 of about 324 (135)

Coverless Image Steganography Method Based on Feature Selection

open access: yesJournal of Information Hiding and Privacy Protection, 2019
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu   +4 more
openaire   +1 more source

Generative steganography method based on auto-generation of contours

open access: yesTongxin xuebao, 2021
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU   +4 more
doaj   +2 more sources

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

Coverless Video Steganography based on Maximum DC Coefficients

open access: yes, 2020
Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography.
Meng, Laijin   +4 more
openaire   +2 more sources

Reinforcement Learning for Robust Modulation Classification in Non‐Orthogonal Multiple Access (NOMA) Systems

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a reinforcement learning–based framework for robust modulation classification and resource management in non‐orthogonal multiple access (NOMA) systems. By integrating Q‐learning, deep reinforcement learning, and proximal policy optimisation, the approach enhances spectral efficiency, mitigates interference, and improves ...
Mohammed M. Alammar   +3 more
wiley   +1 more source

A Robust joint coverless image steganography scheme based on two independent modules

open access: yesCybersecurity
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj   +1 more source

ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley   +1 more source

Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]

open access: yes, 2018
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core   +2 more sources

An Improved Near‐Reversible Technique With Residual Networks

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley   +1 more source

A Heuristic Model for Supporting Users’ Decision‐Making in Privacy Disclosure for Recommendation

open access: yesSecurity and Communication Networks, Volume 2018, Issue 1, 2018., 2018
Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high‐quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to ...
Hongchen Wu   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy