Results 1 to 10 of about 8,449 (218)
Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection
Deep neural networks (DNN) are applied in various fields because they afford good performance. However, they seem vulnerable to adversarial examples. Therefore, studies are actively investigating adversarial defenses to improve the robustness of DNNs as ...
Hyunsik Na, Gwonsang Ryu, Daeseon Choi
doaj +1 more source
Color Images Hiding Based on Wavelet Based Fusion [PDF]
At present, information is being communicated and proceeds automatically on a large scale. Hence, the required measures for secure storage and transporting of the information are increased. The protection of the information is necessary to guard economic
Saddam Kamil Alwane
doaj +1 more source
MTS-Stega: Linguistic Steganography Based on Multi-Time-Step
Generative linguistic steganography encodes candidate words with conditional probability when generating text by language model, and then, it selects the corresponding candidate words to output according to the confidential message to be embedded ...
Long Yu +3 more
doaj +1 more source
Imperceptible magnetoelectronics [PDF]
AbstractFuture electronic skin aims to mimic nature’s original both in functionality and appearance. Although some of the multifaceted properties of human skin may remain exclusive to the biological system, electronics opens a unique path that leads beyond imitation and could equip us with unfamiliar senses.
Michael Melzer +7 more
openaire +3 more sources
DARI-Mark: Deep Learning and Attention Network for Robust Image Watermarking
At present, deep learning has achieved excellent achievements in image processing and computer vision and is widely used in the field of watermarking. Attention mechanism, as the research hot spot of deep learning, has not yet been applied in the field ...
Yimeng Zhao +3 more
doaj +1 more source
An Enhanced Steganography Network for Concealing and Protecting Secret Image Data
The development of Internet technology has provided great convenience for data transmission and sharing, but it also brings serious security problems that are related to data protection. As is detailed in this paper, an enhanced steganography network was
Feng Chen +4 more
doaj +1 more source
Non-Blind Watermarking Menggunakan Discrete dan Wavelet Transform
Pada zaman sekarang orang mudah untuk mengakses internet sehingga semua orang dapat memperoleh suatu karya seni digital seperti gambar dengan mudah, kemudian seseorang dapat memodifikasi dan menyebarkan kembali karya tersebut tanpa izin atau tanpa ...
Daurat Sinaga, Cahaya Jatmoko
doaj +1 more source
Robust Speech Steganography Using Differential SVD
The speech signal is different from the typical audio in terms of spectral bandwidth, intensity distribution, and signal continuity, thus how to achieve high imperceptibility and strong robustness for speech steganography is a big challenge.
Yiming Xue +5 more
doaj +1 more source
An indirect watermark hiding in discrete cosine transform–singular value decomposition domain for copyright protection [PDF]
Digital image watermarking has emerged as a promising solution for copyright protection. In this paper, a discrete cosine transform (DCT) and singular value decomposition (SVD) based hybrid robust image watermarking method using Arnold scrambling is ...
Soumitra Roy, Arup Kumar Pal
doaj +1 more source
Probabilistic Analysis of Targeted Attacks Using Transform-Domain Adversarial Examples
In the past decade, Deep Neural Networks (DNNs) have achieved breakthrough collaborations in developing smart intelligent systems within the field of computer vision, natural language processing, autonomous systems, etc. Recent research has revealed that
Zakia Yahya +3 more
doaj +1 more source

