Results 11 to 20 of about 15,292 (300)

Image Steganography

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding by information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet.
Urmila Pilania, Manoj Kumar
semanticscholar   +7 more sources

A Huffman code LSB based image steganography technique using multi-level encryption and achromatic component of an image. [PDF]

open access: yesSci Rep, 2023
In the recent couple of years, due to the accelerated popularity of the internet, various organizations such as government offices, military, private companies, etc. use different transferring methods for exchanging their information.
Rahman S   +7 more
europepmc   +2 more sources

Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review. [PDF]

open access: yesPLoS One
Information hiding in images has gained popularity. As image steganography gains relevance, techniques for detecting hidden messages have emerged. Statistical steganalysis mechanisms detect the presence of hidden secret messages in images, rendering ...
Apau R   +4 more
europepmc   +2 more sources

A novel and efficient digital image steganography technique using least significant bit substitution. [PDF]

open access: yesSci Rep
Steganography is used to hide sensitive types of data including images, audio, text, and videos in an invisible way so that no one can detect it. Image-based steganography is a technique that uses images as a cover media for hiding and transmitting ...
Rahman S   +8 more
europepmc   +2 more sources

Comparative performance assessment of deep learning based image steganography techniques. [PDF]

open access: yesSci Rep, 2022
Increasing data infringement while transmission and storage have become an apprehension for the data owners. Even the digital images transmitted over the network or stored at servers are prone to unauthorized access.
Himthani V   +5 more
europepmc   +2 more sources

Survey on image non-additive steganography

open access: yes网络与信息安全学报, 2021
Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories ...
Yaofei WANG   +4 more
doaj   +3 more sources

CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]

open access: yesNeural Information Processing Systems, 2023
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images.
Jiwen Yu   +3 more
semanticscholar   +1 more source

Digital steganography model and its formal description

open access: yes网络与信息安全学报, 2020
In order to make the research of digital steganography model develop synchronously with steganography research, three digital steganography models from general to specific are proposed, and each model was formalized.
SONG Haitao, TANG Guangming, SUN Yifeng, WANG Yang
doaj   +3 more sources

Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction [PDF]

open access: yesExpert systems with applications, 2023
Transmitting images for communication on social networks has become routine, which is helpful for covert communication. The traditional steganography algorithm is unable to successfully convey secret information since the social network channel will ...
Xiaolong Duan   +4 more
semanticscholar   +1 more source

Image Steganography

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: The behavior of posting pictures on social network structures is befell everywhere and every single 2nd. for this reason, the conversation channels supplied through various social networks have a remarkable potential for covert verbal exchange.
Pratham Patil   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy