Results 231 to 240 of about 15,292 (300)
Some of the next articles are maybe not open access.
Image Steganography in Color Conversion
IEEE Transactions on Circuits and Systems II: Express BriefsFor image steganography, no matter how ingenious the distortion function is designed, the embedding operation will lead to changes in the distribution of cover image, which causes security risks.
Qi Li 0029 +4 more
openaire +2 more sources
StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model
ACM Multimedia, 2023Image steganography is the technology of concealing secret messages within an image. Recently, generative image steganography has been developed, which conceals secret messages during image generation.
Yinyin Peng +5 more
semanticscholar +1 more source
Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction
IEEE transactions on multimedia, 2023Most of the existing image selection-based coverless image steganography methods mainly focus on improving the capacity and robustness under the assumption that the corresponding dataset is available.
Liming Zou +4 more
semanticscholar +1 more source
The Computer Journal, 2011
Steganalysis is the reasonable method to detect whether the transmitted media content contains secret messages (e.g. business secrecy). This paper proposes two steganalysis methods to estimate the modification ratio of F5 steganography and its improved version that are popularly used to hide secrecy in images.
Xiangyang Luo +4 more
openaire +1 more source
Steganalysis is the reasonable method to detect whether the transmitted media content contains secret messages (e.g. business secrecy). This paper proposes two steganalysis methods to estimate the modification ratio of F5 steganography and its improved version that are popularly used to hide secrecy in images.
Xiangyang Luo +4 more
openaire +1 more source
A Robust Coverless Image Steganography Based on an End-to-End Hash Generation Model
IEEE transactions on circuits and systems for video technology (Print), 2023Recently, coverless steganography algorithms have attracted increased research attention due to their ability to completely resist steganalysis algorithms.
Laijin Meng +4 more
semanticscholar +1 more source
A survey on Deep-Learning-based image steganography
Expert Systems With ApplicationsBingbing Song +2 more
exaly +2 more sources
Steganography in stylized images
Journal of Electronic Imaging, 2019We propose a steganographic scheme for stylized images. Given a natural image, an image style transfer algorithm is executed twice to produce two similar stylized images with different parameters. One of them is used for embedding and another one is employed as a reference. For the cover image, embedding costs are assigned to measure the detection risk
Nan Zhong +3 more
openaire +1 more source
Deep learning based image steganography: A review
WIREs Data. Mining. Knowl. Discov., 2022A review of the deep learning based image steganography techniques is presented in this paper. For completeness, the recent traditional steganography techniques are also discussed briefly.
M. Wani, Bisma Sultan
semanticscholar +1 more source
Steganography and classification of image steganography techniques
2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire +1 more source
An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning
IEEE Transactions on Information Forensics and Security, 2021Automatic cost learning for steganography based on deep neural networks is receiving increasing attention. Steganographic methods under such a framework have been shown to achieve better security performance than methods adopting hand-crafted costs ...
Weixuan Tang +4 more
semanticscholar +1 more source

