Results 71 to 80 of about 183 (96)
Boosting Digital Safeguards: Blending Cryptography and Steganography
In today's digital age, the internet is essential for communication and the sharing of information, creating a critical need for sophisticated data security measures to prevent unauthorized access and exploitation.
Biswas, Soumyajit +7 more
core
Coverless Text Steganography Method Based on Characteristics of Word Association
The search-based coverless steganography methods can effectively resist the potential steganalysis attacks, but there are still some limitations such as low hiding capacity and unstable success rate of hiding. To address those problems, this paper proposed a coverless steganography method based on characteristics of word association.
Wei Zhang +3 more
openaire +2 more sources
Coverless Text Steganography Based on Half Frequency Crossover Rule
In the development process of the information hiding technology, text steganography is a challenging task for researchers because of the small redundancy of information and the difficulty in hiding information. In this paper, a coverless text steganography method is proposed based on the Markov model and the half frequency crossover rule, which accords
Ning Wu +5 more
openaire +2 more sources
Research on Coverless Text Steganography Based on Multi-rule Language Models Alternation
Information hiding technology usually uses video, audio, image, and text as carriers. Among them, text redundancy is less and it is difficult to hide information. However, the text is widely used, so text-based information hiding has very important research significance.
Ning Wu +5 more
openaire +2 more sources
A Robust Generative Coverless Co-steganography Method of Text and Image
Le Mao, Yun Tan, Yuxi Deng, Xuyu Xiang
+4 more sources
Enhancing cloud security using coverless text steganography
Pabak Indu +6 more
openaire +2 more sources
Coverless Image Steganography Based on Semantic-Controlled Text-to-Image Generation
Xiao Li +4 more
openaire +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Enhancing Arabic text steganography for personal usage utilizing pseudo-spaces
Journal of King Saud University - Computer and Information Sciences, 2021Adnan Gutub
exaly
An email-based high capacity text steganography using repeating characters
International Journal of Computers and Applications, 2021Mansoor Fateh, Mohsen Rezvani
exaly

