Results 51 to 60 of about 1,324 (155)

A multi-image steganography: ISS

open access: yesCybersecurity
Unlike single-image steganography, the scheme of payload distribution on different images plays a pivotal role in the security performance of multi-image steganography. In this paper, a novel multi-image steganography scheme: image stitching sender (ISS)
Shihao Zhang   +3 more
doaj   +1 more source

A Robust joint coverless image steganography scheme based on two independent modules

open access: yesCybersecurity
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj   +1 more source

Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics
Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers.
Omar Abed Najm, Ahmed Nori
doaj   +1 more source

Throughput increase of the covert communication channel organized by the stable steganography algorithm using spatial domain of the image

open access: yesTrudy Odesskogo Politehničeskogo Universiteta, 2016
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj   +1 more source

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing
Image steganography is the art of concealing secret information within images to prevent detection. In deep‐learning‐based image steganography, a common practice is to fuse the secret image with the cover image to directly generate the stego image ...
Yuling Zhu   +3 more
doaj   +1 more source

Coverless Image Steganography: A Survey

open access: yesIEEE Access, 2019
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin   +4 more
doaj   +1 more source

Enhanced payload volume in the least significant bits image steganography using hash function. [PDF]

open access: yesPeerJ Comput Sci, 2023
Ghadi YY   +5 more
europepmc   +1 more source

Multi-Image Steganography

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Steganography is the practice of concealing information within various types of data, encompassing the embedding of confidential content like messages, images, audio, or video within a cover image. The primary objective involves hiding the secret message or image within the selected image through the utilization of the Least Significant Bit (LSB ...
openaire   +1 more source

A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE [PDF]

open access: yesJournal of Engineering Science and Technology, 2013
Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image ...
MELAD J. SAEED
doaj  

Home - About - Disclaimer - Privacy