Results 11 to 20 of about 14,292 (271)

Deep Image Steganography Using Transformer and Recursive Permutation [PDF]

open access: yesEntropy, 2022
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang   +3 more
doaj   +2 more sources

High-Capacity Image Steganography Based on Improved Xception [PDF]

open access: yesSensors, 2020
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan   +4 more
doaj   +2 more sources

SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network [PDF]

open access: yesEntropy, 2020
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper,
Xintao Duan   +4 more
doaj   +2 more sources

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +3 more sources

Image Steganography

open access: yesInternational Journal of Advanced Research in Science, Communication and Technology, 2021
Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties.
Sana Parveen K   +3 more
  +5 more sources

Random Matrix Transformation and Its Application in Image Hiding

open access: yesSensors, 2023
Image coding technology has become an indispensable technology in the field of modern information. With the vigorous development of the big data era, information security has received more attention.
Jijun Wang, Fun Soo Tan, Yi Yuan
doaj   +1 more source

Survey on image non-additive steganography

open access: yes网络与信息安全学报, 2021
Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories ...
Yaofei WANG   +4 more
doaj   +3 more sources

Digital steganography model and its formal description

open access: yes网络与信息安全学报, 2020
In order to make the research of digital steganography model develop synchronously with steganography research, three digital steganography models from general to specific are proposed, and each model was formalized.
SONG Haitao, TANG Guangming, SUN Yifeng, WANG Yang
doaj   +3 more sources

Image Steganography

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: The behavior of posting pictures on social network structures is befell everywhere and every single 2nd. for this reason, the conversation channels supplied through various social networks have a remarkable potential for covert verbal exchange.
Pratham Patil   +4 more
openaire   +1 more source

JPEG steganography with particle swarm optimization accelerated by AVX [PDF]

open access: yes, 2020
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy