Results 1 to 10 of about 150 (66)

STBS-Stega: Coverless text steganography based on state transition-binary sequence [PDF]

open access: goldInternational Journal of Distributed Sensor Networks, 2020
Information-hiding technology has recently developed into an area of significant interest in the field of information security. As one of the primary carriers in steganography, it is difficult to hide information in texts because there is insufficient ...
Ning Wu   +6 more
doaj   +3 more sources

A Coverless Plain Text Steganography Based on Character Features [PDF]

open access: goldIEEE Access, 2019
The coverless text steganography has become a research hotspot in the field of information hiding because no modification to a text carrier will improve the concealment of steganography. However, compared with images, audios, videos, or other carriers, a
Kaixi Wang, Quansheng Gao
doaj   +3 more sources

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association [PDF]

open access: hybridSecurity and Communication Networks, 2021
Recently, researchers have shown that coverless steganography is relatively safe. On this basis, to improve the payload of the coverless steganography, a novel semiconstruction coverless steganography algorithm is introduced in the paper. Firstly, web crawler technology is applied to crawl a wide range of small icons and hot news images from the ...
Yajing Hao   +4 more
openaire   +2 more sources

A Coverless Text Steganography by Encoding the Chinese Characters' Component Structures

open access: diamondInternational Journal of Digital Crime and Forensics, 2022
The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in text steganography. This paper proposes a text coverless steganography method by encoding the Chinese characters’ component ...
Kaixi Wang, Xiangmei Yu, Ziyi Zou
openaire   +3 more sources

Research on Coverless Text Steganography Based on Single Bit Rules

open access: diamondJournal of Physics: Conference Series, 2019
Abstract Text steganography has become a hotspot in the field of information security in recent years. As an important steganographic carrier, text does not have the advantage that other multimedia could easily use more redundancy to hide information.
Ning Wu   +5 more
openaire   +2 more sources

Coverless Text Steganography Based on Maximum Variable Bit Embedding Rules

open access: diamondJournal of Physics: Conference Series, 2019
As a carrier of information hiding, text is difficult to hide secret because of its less redundancy. The robustness and security of some traditional methods based text are not high. Based on Markov chain model, a coverless text steganography algorithm was proposed in this paper. According to the characteristic and value of transition probability in the
Ning Wu   +5 more
openaire   +2 more sources

A Coverless Text Steganography by Encoding the Chinese Characters’ Component Structures

open access: diamondInternational Journal of Digital Crime and Forensics, 2021
The current coverless text steganography methods have a low steganographic capacity, and yet some of them cannot assure a message can be concealed. How to achieve a high steganographic capacity has become the research hotspot in text steganography. This paper proposes a text coverless steganography method by encoding the Chinese characters’ component ...
openaire   +2 more sources

An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS [PDF]

open access: diamondKSII Transactions on Internet and Information Systems, 2021
Yuling Liu, Jiao Wu, Xianyi Chen
openaire   +2 more sources

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning

open access: yesIEEE Access, 2021
The most significant factor to consider during private information transmission through the internet (i.e., insecure channel) is security. So, to keep this data from unauthorized access during transmission, steganography is used.
Al Hussien S. Saad   +2 more
doaj   +1 more source

Securing Messages by Using Coverless Steganography : A Survey [PDF]

open access: yes, 2022
In the last few decades, with the digitalization of information, digital data transmitted overinsecure communication can be under attack, so driving steganography to the forefront for securecommunication.
NAHLA F. OMRAN, NADA R. MAHMOUD, ABDELMAGEID A. ALI
core   +2 more sources

Home - About - Disclaimer - Privacy