Results 51 to 60 of about 183 (96)

A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]

open access: yes
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core   +2 more sources

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2800-2815, 21 August 2024.
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng   +5 more
wiley   +1 more source

Keamanan Komunikasi Data Pada Jaringan Komputer Berbasis Socket Programming [PDF]

open access: yes, 2023
A socket is software used to communicate data between computers on a network, which is a combination of an IP (Internet Protocol) address and a port number.
Febrian, Ibnu   +3 more
core   +1 more source

Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]

open access: yes, 2018
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman   +8 more
core   +2 more sources

Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

open access: yes, 2021
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia   +5 more
core  

Towards Improved Steganalysis: When Cover Selection is Used in Steganography [PDF]

open access: yes, 2019
This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a ...
Li, Shujun, Wang, Zichi, Zhang, Xinpeng
core   +1 more source

Overview of Digital Image Restoration [PDF]

open access: yes, 2019
Image restoration is an image processing technology with great practical value in the field of computer vision. It is a computer technology that estimates the image information of the damaged area according to the residual image information of the ...
Biruk Assefa   +5 more
core   +2 more sources

A secure cooperative image super-resolution transmission with decode-and-forward relaying over Rayleigh fading channels [PDF]

open access: yes
In addition to susceptibility to performance degradation due to hardware malfunctions and environmental influences, wireless image transmission poses risks of information exposure to eavesdroppers.
Duong, H.-T.   +5 more
core   +1 more source

Diffusion-Stego: Training-free Diffusion Generative Steganography via Message Projection

open access: yes, 2023
Generative steganography is the process of hiding secret messages in generated images instead of cover images. Existing studies on generative steganography use GAN or Flow models to obtain high hiding message capacity and anti-detection ability over ...
Choi, Jooyoung   +4 more
core  

Generative Steganography Diffusion

open access: yes, 2023
Generative steganography (GS) is an emerging technique that generates stego images directly from secret data. Various GS methods based on GANs or Flow have been developed recently.
Li, Sheng   +5 more
core  

Home - About - Disclaimer - Privacy