Results 51 to 60 of about 1,324 (155)
A multi-image steganography: ISS
Unlike single-image steganography, the scheme of payload distribution on different images plays a pivotal role in the security performance of multi-image steganography. In this paper, a novel multi-image steganography scheme: image stitching sender (ISS)
Shihao Zhang +3 more
doaj +1 more source
A Robust joint coverless image steganography scheme based on two independent modules
With the development of deep learning technology, great progress has been made in the field of coverless steganography based on deep learning technology, including some selection-based steganography methods that use deep learning technology and all ...
Chang Ren, Bin Wu
doaj +1 more source
Steganography Traditional Methods and M2PAM in Social Media Environments: A Survey [PDF]
Steganography is one of the important topics in the field of data security. This is because of the exponential progress and secret communication of prospective computers.
Omar Abed Najm, Ahmed Nori
doaj +1 more source
At the organization of a covert communication channel a number of requirements are imposed on used steganography algorithms among which one of the main are: resistance to attacks against the built-in message, reliability of perception of formed ...
O.V. Kostyrka
doaj +1 more source
Hiding image into image with hybrid attention mechanism based on GANs
Image steganography is the art of concealing secret information within images to prevent detection. In deep‐learning‐based image steganography, a common practice is to fuse the secret image with the cover image to directly generate the stego image ...
Yuling Zhu +3 more
doaj +1 more source
Coverless Image Steganography: A Survey
With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most ...
Jiaohua Qin +4 more
doaj +1 more source
Enhanced payload volume in the least significant bits image steganography using hash function. [PDF]
Ghadi YY +5 more
europepmc +1 more source
Lossless Image Steganography Based on Invertible Neural Networks. [PDF]
Liu L, Tang L, Zheng W.
europepmc +1 more source
Steganography is the practice of concealing information within various types of data, encompassing the embedding of confidential content like messages, images, audio, or video within a cover image. The primary objective involves hiding the secret message or image within the selected image through the utilization of the Least Significant Bit (LSB ...
openaire +1 more source
A NEW TECHNIQUE BASED ON CHAOTIC STEGANOGRAPHY AND ENCRYPTION TEXT IN DCT DOMAIN FOR COLOR IMAGE [PDF]
Image steganography is the art of hiding information into a cover image. This paper presents a new technique based on chaotic steganography and encryption text in DCT domain for color image, where DCT is used to transform original image (cover image ...
MELAD J. SAEED
doaj

