Results 61 to 70 of about 183 (96)

PRZEGLĄD GENERATYWNYCH SIECI PRZECIWSTAWNYCH DLA ZASTOSOWAŃ BEZPIECZEŃSTWA [PDF]

open access: yes
Advances in cybersecurity are crucial for a country's economic and national security. As data transmission and storage exponentially increase, new threat detection and mitigation techniques are urgently needed.
Gottapu, Sasibhushana Rao   +3 more
core   +2 more sources

A GLCM-Feature-Based Approach for Reversible Image Transformation [PDF]

open access: yes
Recently, a reversible image transformation (RIT) technology that transforms a secret image to a freely-selected target image is proposed. It not only can generate a stego-image that looks similar to the target image, but also can recover the secret ...
Haidong Zhong, Xianyi Chen, Zhifeng Bao
core   +2 more sources

Diffusion-Based Hierarchical Image Steganography

open access: yes
This paper introduces Hierarchical Image Steganography, a novel method that enhances the security and capacity of embedding multiple images into a single container using diffusion models.
Meng, Xiandong   +5 more
core  

Reversible data hiding with selective bits difference expansion and modulus function [PDF]

open access: yes
The integration of the internet of things (IoT) has significantly enhanced human life but also raises concerns about information security and privacy. Information security can be achieved through cryptography, which encrypts data to make it unreadable ...
Arham, Aulia   +2 more
core   +2 more sources

DiffStega: Towards Universal Training-Free Coverless Image Steganography with Diffusion Models

open access: yes
Traditional image steganography focuses on concealing one image within another, aiming to avoid steganalysis by unauthorized entities. Coverless image steganography (CIS) enhances imperceptibility by not using any cover image.
Gao, Zhongpai   +7 more
core  

Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography

open access: yes
Linguistic steganography provides convenient implementation to hide messages, particularly with the emergence of AI generation technology. The potential abuse of this technology raises security concerns within societies, calling for powerful linguistic ...
Huang, Yongfeng   +3 more
core  

Image steganalysis using active learning and hyperparameter optimization. [PDF]

open access: yesSci Rep
Bohang L   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy