Results 71 to 80 of about 183 (96)

Boosting Digital Safeguards: Blending Cryptography and Steganography

open access: yes
In today's digital age, the internet is essential for communication and the sharing of information, creating a critical need for sophisticated data security measures to prevent unauthorized access and exploitation.
Biswas, Soumyajit   +7 more
core  

Coverless Text Steganography Method Based on Characteristics of Word Association

open access: closed2020 IEEE 20th International Conference on Communication Technology (ICCT), 2020
The search-based coverless steganography methods can effectively resist the potential steganalysis attacks, but there are still some limitations such as low hiding capacity and unstable success rate of hiding. To address those problems, this paper proposed a coverless steganography method based on characteristics of word association.
Wei Zhang   +3 more
openaire   +2 more sources

Coverless Text Steganography Based on Half Frequency Crossover Rule

open access: closed2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), 2019
In the development process of the information hiding technology, text steganography is a challenging task for researchers because of the small redundancy of information and the difficulty in hiding information. In this paper, a coverless text steganography method is proposed based on the Markov model and the half frequency crossover rule, which accords
Ning Wu   +5 more
openaire   +2 more sources

Research on Coverless Text Steganography Based on Multi-rule Language Models Alternation

open access: closed2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE), 2019
Information hiding technology usually uses video, audio, image, and text as carriers. Among them, text redundancy is less and it is difficult to hide information. However, the text is widely used, so text-based information hiding has very important research significance.
Ning Wu   +5 more
openaire   +2 more sources

A Robust Generative Coverless Co-steganography Method of Text and Image

open access: closedInternational Journal of Autonomous and Adaptive Communications Systems
Le Mao, Yun Tan, Yuxi Deng, Xuyu Xiang
  +4 more sources

Enhancing cloud security using coverless text steganography

open access: closedAIP Conference Proceedings
Pabak Indu   +6 more
openaire   +2 more sources

Coverless Image Steganography Based on Semantic-Controlled Text-to-Image Generation

open access: closedIEEE Transactions on Circuits and Systems for Video Technology
Xiao Li   +4 more
openaire   +2 more sources

A Review on Text Steganography Techniques

Mathematics, 2021
Rossilawati Sulaiman   +2 more
exaly  

Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces

Journal of King Saud University - Computer and Information Sciences, 2021
Adnan Gutub
exaly  

An email-based high capacity text steganography using repeating characters

International Journal of Computers and Applications, 2021
Mansoor Fateh, Mohsen Rezvani
exaly  

Home - About - Disclaimer - Privacy