Results 231 to 240 of about 15,292 (300)
Some of the next articles are maybe not open access.

Image Steganography in Color Conversion

IEEE Transactions on Circuits and Systems II: Express Briefs
For image steganography, no matter how ingenious the distortion function is designed, the embedding operation will lead to changes in the distribution of cover image, which causes security risks.
Qi Li 0029   +4 more
openaire   +2 more sources

StegaDDPM: Generative Image Steganography based on Denoising Diffusion Probabilistic Model

ACM Multimedia, 2023
Image steganography is the technology of concealing secret messages within an image. Recently, generative image steganography has been developed, which conceals secret messages during image generation.
Yinyin Peng   +5 more
semanticscholar   +1 more source

Robust Coverless Image Steganography Based on Neglected Coverless Image Dataset Construction

IEEE transactions on multimedia, 2023
Most of the existing image selection-based coverless image steganography methods mainly focus on improving the capacity and robustness under the assumption that the corresponding dataset is available.
Liming Zou   +4 more
semanticscholar   +1 more source

On F5 Steganography in Images

The Computer Journal, 2011
Steganalysis is the reasonable method to detect whether the transmitted media content contains secret messages (e.g. business secrecy). This paper proposes two steganalysis methods to estimate the modification ratio of F5 steganography and its improved version that are popularly used to hide secrecy in images.
Xiangyang Luo   +4 more
openaire   +1 more source

A Robust Coverless Image Steganography Based on an End-to-End Hash Generation Model

IEEE transactions on circuits and systems for video technology (Print), 2023
Recently, coverless steganography algorithms have attracted increased research attention due to their ability to completely resist steganalysis algorithms.
Laijin Meng   +4 more
semanticscholar   +1 more source

A survey on Deep-Learning-based image steganography

Expert Systems With Applications
Bingbing Song   +2 more
exaly   +2 more sources

Steganography in stylized images

Journal of Electronic Imaging, 2019
We propose a steganographic scheme for stylized images. Given a natural image, an image style transfer algorithm is executed twice to produce two similar stylized images with different parameters. One of them is used for embedding and another one is employed as a reference. For the cover image, embedding costs are assigned to measure the detection risk
Nan Zhong   +3 more
openaire   +1 more source

Deep learning based image steganography: A review

WIREs Data. Mining. Knowl. Discov., 2022
A review of the deep learning based image steganography techniques is presented in this paper. For completeness, the recent traditional steganography techniques are also discussed briefly.
M. Wani, Bisma Sultan
semanticscholar   +1 more source

Steganography and classification of image steganography techniques

2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire   +1 more source

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning

IEEE Transactions on Information Forensics and Security, 2021
Automatic cost learning for steganography based on deep neural networks is receiving increasing attention. Steganographic methods under such a framework have been shown to achieve better security performance than methods adopting hand-crafted costs ...
Weixuan Tang   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy