Results 41 to 50 of about 169 (95)

Adopt an optimal location using a genetic algorithm for audio steganography [PDF]

open access: yes, 2021
With the development of technologies, most of the users utilizing the Internet for transmitting information from one place to another place. The transmitted data may be affected because of the intermediate user.
Raheema, Alaa Q.
core   +2 more sources

Coverless Steganography for Face Recognition Based on Diffusion Model

open access: yesIEEE Access
As a highly recognizable biometric face recognition technology, it has been widely used in many identity verification systems. In order to enhance the protection of personal privacy and ensure the safe transmission and sharing of sensitive information ...
Yuan Guo, Ziqi Liu
doaj   +1 more source

Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks [PDF]

open access: yes, 2021
        إخفاء المعلومات هو تقنية لإخفاء البيانات السرية ضمن ملفات أخرى من نفس النوع أو في أنواع أخرى. وتعد تقنية إخفاء البيانات من التقنيات الضروريه في أمن المعلومات الرقمية.
Abdulmunem, Inas Ali   +2 more
core   +2 more sources

ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley   +1 more source

Steganography Approach to Image Authentication Using Pulse Coupled Neural Network [PDF]

open access: yes, 2023
This paper introduces a model for the authentication of large-scale images. The crucial element of the proposed model is the optimized Pulse Coupled Neural Network.
Badidová, Bianca   +3 more
core   +1 more source

An Improved Near‐Reversible Technique With Residual Networks

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley   +1 more source

A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]

open access: yes
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core   +2 more sources

VidaGAN: Adaptive GAN for image steganography

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3329-3342, 16 October 2024.
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi   +2 more
wiley   +1 more source

A NEW AND ADAPTIVE SECURITY MODEL FOR PUBLIC COMMUNICATION BASED ON CORRELATION OF DATA FRAMES [PDF]

open access: yes, 2019
Recent developments in communication and information technologies, plus the emerging of the Internet of Things (IoT) and machine to machine (M2M) principles, create the need to protect data from multiple types of attacks. In this paper, a secure and high
Dhiaa Halboot Muhsen   +3 more
core   +2 more sources

AI‐generated video steganography based on semantic segmentation

open access: yesIET Image Processing, Volume 18, Issue 11, Page 3042-3054, 18 September 2024.
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy