PRZEGLĄD GENERATYWNYCH SIECI PRZECIWSTAWNYCH DLA ZASTOSOWAŃ BEZPIECZEŃSTWA [PDF]
Advances in cybersecurity are crucial for a country's economic and national security. As data transmission and storage exponentially increase, new threat detection and mitigation techniques are urgently needed.
Gottapu, Sasibhushana Rao +3 more
core +2 more sources
A GLCM-Feature-Based Approach for Reversible Image Transformation [PDF]
Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret ...
Haidong Zhong, Xianyi Chen, Zhifeng Bao
core +2 more sources
Diffusion-Based Hierarchical Image Steganography
This paper introduces Hierarchical Image Steganography, a novel method that enhances the security and capacity of embedding multiple images into a single container using diffusion models.
Meng, Xiandong +5 more
core
Reversible data hiding with selective bits difference expansion and modulus function [PDF]
The integration of the internet of things (IoT) has significantly enhanced human life but also raises concerns about information security and privacy. Information security can be achieved through cryptography, which encrypts data to make it unreadable ...
Arham, Aulia +2 more
core +2 more sources
DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models
Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image.
Gao, Zhongpai +7 more
core
Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography
Linguistic steganography provides convenient implementation to hide messages, particularly with the emergence of AI generation technology. The potential abuse of this technology raises security concerns within societies, calling for powerful linguistic ...
Huang, Yongfeng +3 more
core
Adaptive network steganography using deep learning and multimedia video analysis for enhanced security and fidelity. [PDF]
Han C, Xue T.
europepmc +1 more source
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review. [PDF]
Apau R +4 more
europepmc +1 more source
Image steganography without embedding by carrier secret information for secure communication in networks. [PDF]
Zhang Y +5 more
europepmc +1 more source
Image steganalysis using active learning and hyperparameter optimization. [PDF]
Bohang L +9 more
europepmc +1 more source

