Results 1 to 10 of about 8,674 (276)

SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network

open access: yesEntropy, 2020
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper,
Xintao Duan   +4 more
doaj   +3 more sources

AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography [PDF]

open access: yesEntropy
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant ...
Haiju Fan, Changyuan Jin, Ming Li
doaj   +2 more sources

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Xintao Duan   +5 more
doaj   +3 more sources

ARPNetSteg: Network Steganography Using Address Resolution Protocol [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
Steganography is a technique that allows hidden transfer of data using some media such as Image, Audio, Video, Network Protocol or a Document, without its existence getting noticed. Over the past few years, a lot of research has been done in the field of
Punam Bedi, Arti Dua
doaj   +1 more source

Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network

open access: yesSINTECH (Science and Information Technology) Journal, 2023
In the era of information technology, it is very important to protect data and information so that irresponsible parties do not misuse it. One technique for securing data is steganography. Steganography is a technique of hiding messages in a medium.
Khairunnisak Khairunnisak   +2 more
doaj   +1 more source

High-Capacity Image Steganography Based on Improved Xception

open access: yesSensors, 2020
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan   +4 more
doaj   +1 more source

A Walk-through towards Network Steganography Techniques

open access: yesИнформатика и автоматизация, 2023
2D and 3D digital multimedia files offer numerous benefits like excellent quality, compression, editing, reliable copying, etc. These qualities of the multimedia files, on the other hand, are the cause of fear including the fear of getting access to data
Urmila Pilania   +3 more
doaj   +1 more source

Recent Advances of Image Steganography With Generative Adversarial Networks

open access: yesIEEE Access, 2020
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu   +6 more
doaj   +1 more source

Image Steganography: A Review of the Recent Advances

open access: yesIEEE Access, 2021
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Nandhini Subramanian   +3 more
doaj   +1 more source

IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography.
Zhujun Jin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy