Results 251 to 260 of about 15,292 (300)
Some of the next articles are maybe not open access.
Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model
IEEE transactions on circuits and systems for video technology (Print), 2021Recent advances on adaptive steganography show that the performance of image steganographic communication can be improved by incorporating the non-additive models that capture the dependencies among adjacent pixels.
Wenkang Su +3 more
semanticscholar +1 more source
Image Steganography Approaches and Their Detection Strategies: A Survey
ACM Computing SurveysSteganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of image, video, audio and text files are tweaked to represent the information to hide.
Meike Kombrink, Z. Geradts, M. Worring
semanticscholar +1 more source
A New Adversarial Embedding Method for Enhancing Image Steganography
IEEE Transactions on Information Forensics and Security, 2021Image steganography aims to embed secret messages into cover images in an imperceptible manner. While steganalysis tries to identify stegos from covers, which is a special binary classification problem.
Minglin Liu +3 more
semanticscholar +1 more source
Towards Robust Image Steganography
IEEE Transactions on Circuits and Systems for Video Technology, 2019Posting images on social network platforms is happening everywhere and every single second. Thus, the communication channels offered by various social networks have a great potential for covert communication. However, images transmitted through such channels will usually be JPEG compressed, which fails most of the existing steganographic schemes.
Jinyuan Tao +3 more
openaire +1 more source
Image steganography by wavelet matching
Journal of Electronic Imaging, 2009We introduce a new steganography method for embedding message bits into images by utilizing the mathematical relation between the image and transformation domains. The proposed method matches the message bit sequences with the coefficients of the discrete Haar wavelet transformation (DHWT) by modifying the pixels related to those coefficients.
Nafiz Arica, Ă–mer Kurtuldu
openaire +1 more source
Image Steganography using Least Significant Bit (LSB) - A Systematic Literature Review
2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022Digital image steganography is used to hide confidential data within a cover image. In this context, least significant bit (LSB) is a well-known steganography approach.
M. Aslam +6 more
semanticscholar +1 more source
LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion Models
ACM MultimediaGenerative image steganography has gained significant attention due to its ability to hide secret data during image generation. However, existing generative image steganography methods still face challenges in terms of controllability, usability, and ...
Yinyin Peng +5 more
semanticscholar +1 more source
Adaptive Image Steganography Using Fuzzy Enhancement and Grey Wolf Optimizer
IEEE transactions on fuzzy systems, 2022Adaptive imagesteganography embeds secret messages into areas of cover images with complex features, including rich edges and complex textures. In this article, an adaptive image steganography technique based on the edge and complex texture areas of ...
Jialiang Xie, Honghui Wang, Dongrui Wu
semanticscholar +1 more source
A survey of recent advances in image steganography
Security and Privacy, 2022Over the course of technological development, data security while transmission and storing has always been a field of continuous advancements and key importance.
Akshaya Kumar +2 more
semanticscholar +1 more source
Location-Based Image Steganography
The Smart Computing Review, 2014The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages.
Amitava Nag +3 more
openaire +1 more source

