Results 1 to 10 of about 8,449 (218)

Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection

open access: yesIEEE Access, 2021
Deep neural networks (DNN) are applied in various fields because they afford good performance. However, they seem vulnerable to adversarial examples. Therefore, studies are actively investigating adversarial defenses to improve the robustness of DNNs as ...
Hyunsik Na, Gwonsang Ryu, Daeseon Choi
doaj   +1 more source

Color Images Hiding Based on Wavelet Based Fusion [PDF]

open access: yesEngineering and Technology Journal, 2011
At present, information is being communicated and proceeds automatically on a large scale. Hence, the required measures for secure storage and transporting of the information are increased. The protection of the information is necessary to guard economic
Saddam Kamil Alwane
doaj   +1 more source

MTS-Stega: Linguistic Steganography Based on Multi-Time-Step

open access: yesEntropy, 2022
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate words to output according to the confidential message to be embedded ...
Long Yu   +3 more
doaj   +1 more source

Imperceptible magnetoelectronics [PDF]

open access: yesNature Communications, 2015
AbstractFuture electronic skin aims to mimic nature’s original both in functionality and appearance. Although some of the multifaceted properties of human skin may remain exclusive to the biological system, electronics opens a unique path that leads beyond imitation and could equip us with unfamiliar senses.
Michael Melzer   +7 more
openaire   +3 more sources

DARI-Mark: Deep Learning and Attention Network for Robust Image Watermarking

open access: yesMathematics, 2022
At present, deep learning has achieved excellent achievements in image processing and computer vision and is widely used in the field of watermarking. Attention mechanism, as the research hot spot of deep learning, has not yet been applied in the field ...
Yimeng Zhao   +3 more
doaj   +1 more source

An Enhanced Steganography Network for Concealing and Protecting Secret Image Data

open access: yesEntropy, 2022
The development of Internet technology has provided great convenience for data transmission and sharing, but it also brings serious security problems that are related to data protection. As is detailed in this paper, an enhanced steganography network was
Feng Chen   +4 more
doaj   +1 more source

Non-Blind Watermarking Menggunakan Discrete dan Wavelet Transform

open access: yesJurnal Masyarakat Informatika, 2022
Pada zaman sekarang orang mudah untuk mengakses internet sehingga semua orang dapat memperoleh suatu karya seni digital seperti gambar dengan mudah, kemudian seseorang dapat memodifikasi dan menyebarkan kembali karya tersebut tanpa izin atau tanpa ...
Daurat Sinaga, Cahaya Jatmoko
doaj   +1 more source

Robust Speech Steganography Using Differential SVD

open access: yesIEEE Access, 2019
The speech signal is different from the typical audio in terms of spectral bandwidth, intensity distribution, and signal continuity, thus how to achieve high imperceptibility and strong robustness for speech steganography is a big challenge.
Yiming Xue   +5 more
doaj   +1 more source

An indirect watermark hiding in discrete cosine transform–singular value decomposition domain for copyright protection [PDF]

open access: yesRoyal Society Open Science, 2017
Digital image watermarking has emerged as a promising solution for copyright protection. In this paper, a discrete cosine transform (DCT) and singular value decomposition (SVD) based hybrid robust image watermarking method using Arnold scrambling is ...
Soumitra Roy, Arup Kumar Pal
doaj   +1 more source

Probabilistic Analysis of Targeted Attacks Using Transform-Domain Adversarial Examples

open access: yesIEEE Access, 2020
In the past decade, Deep Neural Networks (DNNs) have achieved breakthrough collaborations in developing smart intelligent systems within the field of computer vision, natural language processing, autonomous systems, etc. Recent research has revealed that
Zakia Yahya   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy