Results 21 to 30 of about 169 (95)

Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]

open access: yes, 2022
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Aslam, Muhammad Saqlain   +5 more
core   +1 more source

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley   +1 more source

New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]

open access: yes, 2023
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core   +2 more sources

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

Text coverless information hiding method based on synonyms expansion and label delivery mechanism [PDF]

open access: yes, 2021
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Guohua WU   +5 more
core   +1 more source

Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]

open access: yesJES: Journal of Engineering Sciences
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza   +2 more
doaj   +1 more source

End-to-end image steganography using deep convolutional autoencoders [PDF]

open access: yes, 2021
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S   +4 more
core   +2 more sources

Research on Coverless Text Steganography Based on Single Bit Rules

open access: yesJournal of Physics: Conference Series, 2019
Abstract Text steganography has become a hotspot in the field of information security in recent years. As an important steganographic carrier, text does not have the advantage that other multimedia could easily use more redundancy to hide information.
Ning Wu   +5 more
openaire   +1 more source

Novel linguistic steganography based on character-level text generation [PDF]

open access: yes, 2020
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic steganographic methods may suffer from the low embedding capacity problem.
Li, Q, Liu, Y, Xiang, L, Yang, S, Zhu, C
core   +1 more source

Coverless Text Steganography Based on Maximum Variable Bit Embedding Rules

open access: yesJournal of Physics: Conference Series, 2019
As a carrier of information hiding, text is difficult to hide secret because of its less redundancy. The robustness and security of some traditional methods based text are not high. Based on Markov chain model, a coverless text steganography algorithm was proposed in this paper. According to the characteristic and value of transition probability in the
Ning Wu   +5 more
openaire   +1 more source

Home - About - Disclaimer - Privacy