Results 51 to 60 of about 324 (135)
Coverless Image Steganography Method Based on Feature Selection
A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use
Anqi Qiu +4 more
openaire +1 more source
Generative steganography method based on auto-generation of contours
To address the problems of limited hiding capacity and inaccurate information extraction in the existing generative steganography methods, a novel generative steganography method was proposed based on auto-generation of contours, which consisted of two ...
Zhili ZHOU +4 more
doaj +2 more sources
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu +4 more
doaj +1 more source
Coverless Video Steganography based on Maximum DC Coefficients
Coverless steganography has been a great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. However, most existing coverless steganography algorithms select images as carriers, and few studies are reported on coverless video steganography.
Meng, Laijin +4 more
openaire +2 more sources
This paper proposes a reinforcement learning–based framework for robust modulation classification and resource management in non‐orthogonal multiple access (NOMA) systems. By integrating Q‐learning, deep reinforcement learning, and proximal policy optimisation, the approach enhances spectral efficiency, mitigates interference, and improves ...
Mohammed M. Alammar +3 more
wiley +1 more source
A Robust joint coverless image steganography scheme based on two independent modules
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj +1 more source
ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley +1 more source
Identifying Materials of Photographic Images and Photorealistic Computer Generated Graphics Based on Deep CNNs [PDF]
Currently, some photorealistic computer graphics are very similar to photographic images. Photorealistic computer generated graphics can be forged as photographic images, causing serious security problems.
Huiyu Sun, Qi Cui, Suzanne McIntosh
core +2 more sources
An Improved Near‐Reversible Technique With Residual Networks
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley +1 more source
A Heuristic Model for Supporting Users’ Decision‐Making in Privacy Disclosure for Recommendation
Privacy issues have become a major concern in the web of resource sharing, and users often have difficulty managing their information disclosure in the context of high‐quality experiences from social media and Internet of Things. Recent studies have shown that users’ disclosure decisions may be influenced by heuristics from the crowds, leading to ...
Hongchen Wu +4 more
wiley +1 more source

