Results 251 to 260 of about 15,292 (300)
Some of the next articles are maybe not open access.

Image Steganography With Symmetric Embedding Using Gaussian Markov Random Field Model

IEEE transactions on circuits and systems for video technology (Print), 2021
Recent advances on adaptive steganography show that the performance of image steganographic communication can be improved by incorporating the non-additive models that capture the dependencies among adjacent pixels.
Wenkang Su   +3 more
semanticscholar   +1 more source

Image Steganography Approaches and Their Detection Strategies: A Survey

ACM Computing Surveys
Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of image, video, audio and text files are tweaked to represent the information to hide.
Meike Kombrink, Z. Geradts, M. Worring
semanticscholar   +1 more source

A New Adversarial Embedding Method for Enhancing Image Steganography

IEEE Transactions on Information Forensics and Security, 2021
Image steganography aims to embed secret messages into cover images in an imperceptible manner. While steganalysis tries to identify stegos from covers, which is a special binary classification problem.
Minglin Liu   +3 more
semanticscholar   +1 more source

Towards Robust Image Steganography

IEEE Transactions on Circuits and Systems for Video Technology, 2019
Posting images on social network platforms is happening everywhere and every single second. Thus, the communication channels offered by various social networks have a great potential for covert communication. However, images transmitted through such channels will usually be JPEG compressed, which fails most of the existing steganographic schemes.
Jinyuan Tao   +3 more
openaire   +1 more source

Image steganography by wavelet matching

Journal of Electronic Imaging, 2009
We introduce a new steganography method for embedding message bits into images by utilizing the mathematical relation between the image and transformation domains. The proposed method matches the message bit sequences with the coefficients of the discrete Haar wavelet transformation (DHWT) by modifying the pixels related to those coefficients.
Nafiz Arica, Ă–mer Kurtuldu
openaire   +1 more source

Image Steganography using Least Significant Bit (LSB) - A Systematic Literature Review

2022 2nd International Conference on Computing and Information Technology (ICCIT), 2022
Digital image steganography is used to hide confidential data within a cover image. In this context, least significant bit (LSB) is a well-known steganography approach.
M. Aslam   +6 more
semanticscholar   +1 more source

LDStega: Practical and Robust Generative Image Steganography based on Latent Diffusion Models

ACM Multimedia
Generative image steganography has gained significant attention due to its ability to hide secret data during image generation. However, existing generative image steganography methods still face challenges in terms of controllability, usability, and ...
Yinyin Peng   +5 more
semanticscholar   +1 more source

Adaptive Image Steganography Using Fuzzy Enhancement and Grey Wolf Optimizer

IEEE transactions on fuzzy systems, 2022
Adaptive imagesteganography embeds secret messages into areas of cover images with complex features, including rich edges and complex textures. In this article, an adaptive image steganography technique based on the edge and complex texture areas of ...
Jialiang Xie, Honghui Wang, Dongrui Wu
semanticscholar   +1 more source

A survey of recent advances in image steganography

Security and Privacy, 2022
Over the course of technological development, data security while transmission and storing has always been a field of continuous advancements and key importance.
Akshaya Kumar   +2 more
semanticscholar   +1 more source

Location-Based Image Steganography

The Smart Computing Review, 2014
The objective of steganography is to conceal the presence of a secret communication. Nevertheless, with the development of steganalytic attack, also known as steganalysis, there are many statistical methods to estimate the presence and ratio of secret messages.
Amitava Nag   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy