Results 51 to 60 of about 169 (95)

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2679-2689, 21 August 2024.
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu   +3 more
wiley   +1 more source

SIHNet: A safe image hiding method with less information leaking

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2800-2815, 21 August 2024.
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng   +5 more
wiley   +1 more source

Keamanan Komunikasi Data Pada Jaringan Komputer Berbasis Socket Programming [PDF]

open access: yes, 2023
A socket is software used to communicate data between computers on a network, which is a combination of an IP (Internet Protocol) address and a port number.
Febrian, Ibnu   +3 more
core   +1 more source

Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

open access: yes, 2021
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia   +5 more
core  

Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]

open access: yes, 2018
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman   +8 more
core   +2 more sources

Towards Improved Steganalysis: When Cover Selection is Used in Steganography [PDF]

open access: yes, 2019
This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a ...
Li, Shujun, Wang, Zichi, Zhang, Xinpeng
core   +1 more source

Analyzing Cross-domain Transportation Big Data of New York City with Semi-supervised and Active Learning [PDF]

open access: yes, 2018
The majority of big data analytics applied to transportation datasets suffer from being too domain-specific, that is, they draw conclusions for a dataset based on analytics on the same dataset. This makes models trained from one domain (e.g.
Huiyu Sun, Suzanne McIntosh
core   +2 more sources

A secure cooperative image super-resolution transmission with decode-and-forward relaying over Rayleigh fading channels [PDF]

open access: yes
In addition to susceptibility to performance degradation due to hardware malfunctions and environmental influences, wireless image transmission poses risks of information exposure to eavesdroppers.
Duong, H.-T.   +5 more
core   +1 more source

Diffusion-Stego: Training-free Diffusion Generative Steganography via Message Projection

open access: yes, 2023
Generative steganography is the process of hiding secret messages in generated images instead of cover images. Existing studies on generative steganography use GAN or Flow models to obtain high hiding message capacity and anti-detection ability over ...
Choi, Jooyoung   +4 more
core  

PRZEGLĄD GENERATYWNYCH SIECI PRZECIWSTAWNYCH DLA ZASTOSOWAŃ BEZPIECZEŃSTWA [PDF]

open access: yes
Advances in cybersecurity are crucial for a country's economic and national security. As data transmission and storage exponentially increase, new threat detection and mitigation techniques are urgently needed.
Gottapu, Sasibhushana Rao   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy