Results 11 to 20 of about 183 (96)

Novel linguistic steganography based on character-level text generation [PDF]

open access: yesMathematics, 2020
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic steganographic methods may suffer from the low embedding capacity problem.
Li, Q, Liu, Y, Xiang, L, Yang, S, Zhu, C
core   +3 more sources

A coverless image steganography based on robust image wavelet hashing [PDF]

open access: yes, 2022
Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools.
Ali, Suhad A.   +2 more
core   +2 more sources

Enhancing of coverless image steganography capacity based on image block features [PDF]

open access: yes, 2023
The idea of coverless information hiding has seen a great deal of development since it was initially introduced due to its effectiveness in defeating steganalysis tools.
A. Ali, Suhad   +2 more
core   +2 more sources

FakeSafe: Human Level Steganography Techniques by Disinformation Mapping Using Cycle-Consistent Adversarial Network

open access: yesIEEE Access, 2021
Steganography is the task of concealing a message within an overt medium such that the presence of the hidden message is barely detectable. Recently, myriads of works have introduced the inchoate techniques of deep learning to the field of steganography.
He Zhu, Dianbo Liu
doaj   +1 more source

Review on feature-based method performance in text steganography [PDF]

open access: yes, 2021
The implementation of steganography in text domain is one the crutial issue that can hide an essential message to avoid the intruder. It is caused every personal information mostly in medium of text, and the steganography itself is expectedly as the ...
Din, Roshidi   +4 more
core   +3 more sources

Hyper Coupled Map Lattices for Hiding Multiple Images

open access: yesComplexity, Volume 2023, Issue 1, 2023., 2023
The concept of a hyper coupled map lattice (CML) is presented in this paper. The complexity of the lattice is increased not by adding another spatial dimension of the lattice but by replacing scalar nodal variables by multidimensional square matrices of iterative variables.
Rasa Smidtaite   +4 more
wiley   +1 more source

IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network

open access: yesIET Image Processing, Volume 16, Issue 11, Page 2854-2862, 18 September 2022., 2022
Abstract Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image‐based information hiding has been a significantly important topic for digital forensics. Here, active image deep steganographic approaches have come forward for hiding data.
Abdullah Ayub Khan   +6 more
wiley   +1 more source

A Novel Coverless Text Steganographic Algorithm Based on Polynomial Encryption

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Aiming at the problems of low text utilization rate and ambiguity of secret information extraction in the “tag + keyword” coverless information hiding methods, we propose a coverless information hiding method of Chinese text based on polynomial encryption in this paper.
Bo Guan   +3 more
wiley   +1 more source

Coverless Video Steganography Based on Audio and Frame Features

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The coverless steganography based on video has become a research hot spot recently. However, the existing schemes usually hide secret information based on the single‐frame feature of video and do not take advantage of other rich features. In this work, we propose a novel coverless steganography, which makes full use of the audio and frame image ...
Chunhu Zhang   +4 more
wiley   +1 more source

A SURVEY PAPER ON AUTOMATED ELECTRONIC TOLLING SYSTEMS USING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY [PDF]

open access: yes, 2022
Purpose: In this paper we carry out a review on Automated e-tolling systems using RFID technology that has already been proposed by other researchers.
Nhapi, Lincoln, Phiri, Misheck
core   +2 more sources

Home - About - Disclaimer - Privacy