Results 11 to 20 of about 14,292 (271)
Deep Image Steganography Using Transformer and Recursive Permutation [PDF]
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang +3 more
doaj +2 more sources
High-Capacity Image Steganography Based on Improved Xception [PDF]
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan +4 more
doaj +2 more sources
SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network [PDF]
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper,
Xintao Duan +4 more
doaj +2 more sources
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu +4 more
doaj +3 more sources
Steganography is the process used hide the existence of information during transmission. Cover mediums like text, image, audio, and video protocols are used to hide the secret information. This process helps to provide secret communication between two parties.
Sana Parveen K +3 more
+5 more sources
Random Matrix Transformation and Its Application in Image Hiding
Image coding technology has become an indispensable technology in the field of modern information. With the vigorous development of the big data era, information security has received more attention.
Jijun Wang, Fun Soo Tan, Yi Yuan
doaj +1 more source
Survey on image non-additive steganography
Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories ...
Yaofei WANG +4 more
doaj +3 more sources
Digital steganography model and its formal description
In order to make the research of digital steganography model develop synchronously with steganography research, three digital steganography models from general to specific are proposed, and each model was formalized.
SONG Haitao, TANG Guangming, SUN Yifeng, WANG Yang
doaj +3 more sources
Abstract: The behavior of posting pictures on social network structures is befell everywhere and every single 2nd. for this reason, the conversation channels supplied through various social networks have a remarkable potential for covert verbal exchange.
Pratham Patil +4 more
openaire +1 more source
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B +7 more
core +1 more source

