Results 41 to 50 of about 183 (96)

An Efficient Light-weight LSB steganography with Deep learning Steganalysis

open access: yes, 2022
Active research is going on to securely transmit a secret message or so-called steganography by using data-hiding techniques in digital images. After assessing the state-of-the-art research work, we found, most of the existing solutions are not promising
Das, Dipnarayan   +2 more
core   +1 more source

Text hiding in text using invisible character [PDF]

open access: yes, 2020
Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples.
Mustafa, Nada Abdul Aziz
core   +3 more sources

Adopt an optimal location using a genetic algorithm for audio steganography [PDF]

open access: yes, 2021
With the development of technologies, most of the users utilizing the Internet for transmitting information from one place to another place. The transmitted data may be affected because of the intermediate user.
Raheema, Alaa Q.
core   +2 more sources

Coverless Steganography for Face Recognition Based on Diffusion Model

open access: yesIEEE Access
As a highly recognizable biometric face recognition technology, it has been widely used in many identity verification systems. In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information ...
Yuan Guo, Ziqi Liu
doaj   +1 more source

Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks [PDF]

open access: yes, 2021
        إخفاء المعلومات هو تقنية لإخفاء البيانات السرية ضمن ملفات أخرى من نفس النوع أو في أنواع أخرى. وتعد تقنية إخفاء البيانات من التقنيات الضروريه في أمن المعلومات الرقمية.
Abdulmunem, Inas Ali   +2 more
core   +2 more sources

Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]

open access: yes, 2023
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca   +3 more
core   +1 more source

VidaGAN: Adaptive GAN for image steganography

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3329-3342, 16 October 2024.
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi   +2 more
wiley   +1 more source

AI‐generated video steganography based on semantic segmentation

open access: yesIET Image Processing, Volume 18, Issue 11, Page 3042-3054, 18 September 2024.
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin   +4 more
wiley   +1 more source

A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]

open access: yes, 2019
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen   +3 more
core   +2 more sources

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2679-2689, 21 August 2024.
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy