Results 31 to 40 of about 183 (96)

End-to-end image steganography using deep convolutional autoencoders [PDF]

open access: yes, 2021
Image steganography is used to hide a secret image inside a cover image in plain sight. Traditionally, the secret data is converted into binary bits and the cover image is manipulated statistically to embed the secret binary bits.
Al-Maadeed, S   +4 more
core   +2 more sources

New Algorithm to Enhance the Accuracy of Extracting Steganography Hidden Data [PDF]

open access: yes, 2023
Cybercriminals are employing various techniques to conceal evidence from investigators, allowing them to avoid tracking the traces of the attack or the traces of crimes. Steganography of information was techniques and tactics used to hide the traces of a
Nourah Alamri, et al.
core   +2 more sources

Coverless Information Hiding Based on the Molecular Structure Images of Material [PDF]

open access: yes, 2018
The traditional information hiding methods embed the secret information by modifying the carrier, which will inevitably leave traces of modification on the carrier. In this way, it is hard to resist the detection of steganalysis algorithm.
Chongzhi Gao   +3 more
core   +2 more sources

Image Steganography: A Review of the Recent Advances [PDF]

open access: yes, 2021
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Al-Maadeed, Somaya   +3 more
core   +2 more sources

Steganography Using Reversible Texture Synthesis Based on Seeded Region Growing and LSB [PDF]

open access: yes, 2018
Steganography technology has been widely used in data transmission with secret information. However, the existing steganography has the disadvantages of low hidden information capacity, poor visual effect of cover images, and is hard to guarantee ...
Jianfeng Lu   +6 more
core   +2 more sources

New text steganography method using the arabic letters dots [PDF]

open access: yes, 2021
With the increasing technological and electronic development, methods have been developed to hide important information using text steganography as a new technology, since it is not noticeable and easy to send and receive.
Ahmed Adeeb, Omer F.   +2 more
core   +3 more sources

An Electronic Lattice Construction Method Based on Game Padding

open access: yesIEEE Access, 2019
The concealment, the steganography success rate, and the steganographic capacity are key performance indicators to text steganography. The existing text steganography methods still have a low steganographic capacity, some syntactic or semantic ambiguity ...
Congfei Sun, Kaixi Wang
doaj   +1 more source

An image steganography using improved hyper-chaotic Henon map and fractal Tromino [PDF]

open access: yes, 2023
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images ...
Krishnan, Kalimuthu   +1 more
core   +2 more sources

STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN [PDF]

open access: yes, 2022
Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where ...
Febrian, Ibnu   +3 more
core   +1 more source

A Fusion Steganographic Algorithm Based on Faster R-CNN [PDF]

open access: yes, 2018
The aim of information hiding is to embed the secret message in a normal cover media such as image, video, voice or text, and then the secret message is transmitted through the transmission of the cover media.
Jin Wang   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy