Results 1 to 10 of about 14,370 (164)
Deep Image Steganography Using Transformer and Recursive Permutation [PDF]
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang +3 more
doaj +2 more sources
High-Capacity Image Steganography Based on Improved Xception [PDF]
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan +4 more
doaj +2 more sources
Using Facebook for Image Steganography [PDF]
Because Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held ...
Dakve, Tejas +3 more
core +2 more sources
SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network [PDF]
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper,
Xintao Duan +4 more
doaj +2 more sources
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu +4 more
doaj +3 more sources
Image Steganography: A Review of the Recent Advances
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Nandhini Subramanian +3 more
doaj +3 more sources
A multi-image steganography: ISS
Unlike single-image steganography, the scheme of payload distribution on different images plays a pivotal role in the security performance of multi-image steganography. In this paper, a novel multi-image steganography scheme: image stitching sender (ISS)
Shihao Zhang +3 more
doaj +2 more sources
Coverless Image Steganography: A Survey
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin +4 more
doaj +2 more sources
121
Sana Parveen K +3 more
+5 more sources
Random Matrix Transformation and Its Application in Image Hiding
Image coding technology has become an indispensable technology in the field of modern information. With the vigorous development of the big data era, information security has received more attention.
Jijun Wang, Fun Soo Tan, Yi Yuan
doaj +1 more source

