Hiding image into image with hybrid attention mechanism based on GANs
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu +3 more
wiley +1 more source
SIHNet: A safe image hiding method with less information leaking
We propose a reversible secret image processing (SIP) module to make the secret images suitable for hiding and make the stego images leak less secret information. Besides, we use a reversible lost information hiding (LIH) module to hide the lost information into the cover images, thus our method can recover the secret images better than other methods ...
Zien Cheng +5 more
wiley +1 more source
Keamanan Komunikasi Data Pada Jaringan Komputer Berbasis Socket Programming [PDF]
A socket is software used to communicate data between computers on a network, which is a combination of an IP (Internet Protocol) address and a port number.
Febrian, Ibnu +3 more
core +1 more source
Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography
Data hiding is the process of embedding information into a noise-tolerant signal such as a piece of audio, video, or image. Digital watermarking is a form of data hiding where identifying data is robustly embedded so that it can resist tampering and be ...
Byrnes, Olivia +5 more
core
Lost in the Digital Wild: Hiding Information in Digital Activities [PDF]
This paper presents a new general framework of information hiding, in which the hidden information is embedded into a collection of activities conducted by selected human and computer entities (e.g., a number of online accounts of one or more online ...
Desoky Abdelrahman +8 more
core +2 more sources
Towards Improved Steganalysis: When Cover Selection is Used in Steganography [PDF]
This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a ...
Li, Shujun, Wang, Zichi, Zhang, Xinpeng
core +1 more source
Analyzing Cross-domain Transportation Big Data of New York City with Semi-supervised and Active Learning [PDF]
The majority of big data analytics applied to transportation datasets suffer from being too domain-specific, that is, they draw conclusions for a dataset based on analytics on the same dataset. This makes models trained from one domain (e.g.
Huiyu Sun, Suzanne McIntosh
core +2 more sources
A secure cooperative image super-resolution transmission with decode-and-forward relaying over Rayleigh fading channels [PDF]
In addition to susceptibility to performance degradation due to hardware malfunctions and environmental influences, wireless image transmission poses risks of information exposure to eavesdroppers.
Duong, H.-T. +5 more
core +1 more source
Diffusion-Stego: Training-free Diffusion Generative Steganography via Message Projection
Generative steganography is the process of hiding secret messages in generated images instead of cover images. Existing studies on generative steganography use GAN or Flow models to obtain high hiding message capacity and anti-detection ability over ...
Choi, Jooyoung +4 more
core
PRZEGLĄD GENERATYWNYCH SIECI PRZECIWSTAWNYCH DLA ZASTOSOWAŃ BEZPIECZEŃSTWA [PDF]
Advances in cybersecurity are crucial for a country's economic and national security. As data transmission and storage exponentially increase, new threat detection and mitigation techniques are urgently needed.
Gottapu, Sasibhushana Rao +3 more
core +2 more sources

