A Survey of Image Information Hiding Algorithms Based on Deep Learning [PDF]
With the development of data science and technology, information security has been further concerned. In order to solve privacy problems such as personal privacy being peeped and copyright being infringed, information hiding algorithms has been developed.
Chengsheng Yuan, Qi Cui, Ruohan Meng
core +2 more sources
SIHNet: A safe image hiding method with less information leaking
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng +5 more
wiley +1 more source
Keamanan Komunikasi Data Pada Jaringan Komputer Berbasis Socket Programming [PDF]
A socket is software used to communicate data between computers on a network, which is a combination of an IP (Internet Protocol) address and a port number.
Febrian, Ibnu +3 more
core +1 more source
Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman +8 more
core +2 more sources
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia +5 more
core
Towards Improved Steganalysis: When Cover Selection is Used in Steganography [PDF]
This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a ...
Li, Shujun, Wang, Zichi, Zhang, Xinpeng
core +1 more source
Overview of Digital Image Restoration [PDF]
Image restoration is an image processing technology with great practical value in the field of computer vision. It is a computer technology that estimates the image information of the damaged area according to the residual image information of the ...
Biruk Assefa +5 more
core +2 more sources
A secure cooperative image super-resolution transmission with decode-and-forward relaying over Rayleigh fading channels [PDF]
In addition to susceptibility to performance degradation due to hardware malfunctions and environmental influences, wireless image transmission poses risks of information exposure to eavesdroppers.
Duong, H.-T. +5 more
core +1 more source
Diffusion-Stego: Training-free Diffusion Generative Steganography via Message Projection
Generative steganography is the process of hiding secret messages in generated images instead of cover images. Existing studies on generative steganography use GAN or Flow models to obtain high hiding message capacity and anti-detection ability over ...
Choi, Jooyoung +4 more
core
Generative Steganography Diffusion
Generative steganography (GS) is an emerging technique that generates stego images directly from secret data. Various GS methods based on GANs or Flow have been developed recently.
Li, Sheng +5 more
core

