Coverless image steganography using morphed face recognition based on convolutional neural network [PDF]
In recent years, information security has become a prime issue of worldwide concern. To improve the validity and proficiency of the image data hiding approach, a piece of state-of-the-art secret information hiding transmission scheme based on morphed ...
Aslam, Muhammad Saqlain +5 more
core +1 more source
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm
This research proposes a new image encryption scheme based on Lorenz hyperchaotic system and Rivest–Shamir–Adleman (RSA) algorithm. Firstly, the initial values of the Lorenz hyperchaotic system are generated by RSA algorithm, and the key stream is produced iteratively.
Riguang Lin, Sheng Li, Zhiyuan Tan
wiley +1 more source
New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core +2 more sources
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources
Text coverless information hiding method based on synonyms expansion and label delivery mechanism [PDF]
To solve the problems of low hiding capacity and weak detection resistance, a method of coverless information hiding based on synonyms expansion and label delivery mechanism was proposed.To begin the proposed method, the secret information were divided ...
Guohua WU +5 more
core +1 more source
Secure and Efficient Coverless Image Steganography Algorithm Based on Higher Frequency Pixel with Tribonacci Matrix [PDF]
With recent rapid progress in information technology, the security of information exchanged via the Internet has become one of the most important problems. Steganography is a powerful solution for this problem.
khlood hamza +2 more
doaj +1 more source
End-to-end image steganography using deep convolutional autoencoders [PDF]
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S +4 more
core +2 more sources
Research on Coverless Text Steganography Based on Single Bit Rules
Abstract Text steganography has become a hotspot in the field of information security in recent years. As an important steganographic carrier, text does not have the advantage that other multimedia could easily use more redundancy to hide information.
Ning Wu +5 more
openaire +1 more source
Novel linguistic steganography based on character-level text generation [PDF]
With the development of natural language processing, linguistic steganography has become a research hotspot in the field of information security. However, most existing linguistic steganographic methods may suffer from the low embedding capacity problem.
Li, Q, Liu, Y, Xiang, L, Yang, S, Zhu, C
core +1 more source
Coverless Text Steganography Based on Maximum Variable Bit Embedding Rules
As a carrier of information hiding, text is difficult to hide secret because of its less redundancy. The robustness and security of some traditional methods based text are not high. Based on Markov chain model, a coverless text steganography algorithm was proposed in this paper. According to the characteristic and value of transition probability in the
Ning Wu +5 more
openaire +1 more source

