Results 21 to 30 of about 183 (96)

[Retracted] A Review of Motion Vector‐Based Video Steganography

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Steganography is a popular research direction in the field of information security. Due to the widespread use of video media, video steganography has received much attention from the research community. Among video steganography, motion vector (MV)‐based video steganography has become one of the critical concerns of researchers due to its large ...
Jun Li   +4 more
wiley   +1 more source

An Improved Privacy Protection Algorithm for Multimodal Data Fusion

open access: yesScientific Programming, Volume 2022, Issue 1, 2022., 2022
With the rapid development of Internet technology, the use and sharing of data have brought great opportunities and challenges to mankind. On the one hand, the development of data sharing and analysis technology has promoted the improvement of economic and social benefits.
Z. F. Chen   +6 more
wiley   +1 more source

A High Secured Steganalysis using QVDHC Model [PDF]

open access: yes, 2022
Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression.
Akki, Praveena   +4 more
core   +3 more sources

Coverless Steganography Based on Motion Analysis of Video

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed.
Yun Tan   +5 more
wiley   +1 more source

A video coverless information hiding algorithm based on semantic segmentation

open access: yesEURASIP Journal on Image and Video Processing, 2020
Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding.
Nan Pan   +4 more
doaj   +1 more source

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley   +1 more source

Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]

open access: yes, 2022
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Aslam, Muhammad Saqlain   +5 more
core   +1 more source

Text coverless information hiding method based on synonyms expansion and label delivery mechanism [PDF]

open access: yes, 2021
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Guohua WU   +5 more
core   +1 more source

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: yesJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy