Results 11 to 20 of about 8,564 (282)
High-Capacity Image Steganography Based on Improved Xception
The traditional cover modification steganography method only has low steganography ability. We propose a steganography method based on the convolutional neural network architecture (Xception) of deep separable convolutional layers in order to solve this ...
Xintao Duan +4 more
doaj +1 more source
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B +7 more
core +1 more source
Multilayer Detection of Network Steganography [PDF]
This paper presents a new method for steganography detection in network protocols. The method is based on a multilayer approach for the selective analysis of derived and aggregated metrics utilizing machine learning algorithms. The main objective is to provide steganalysis capability for networks with large numbers of devices and connections.
Milosz Smolarczyk +2 more
openaire +1 more source
SteganoCNN: Image Steganography with Generalization Ability Based on Convolutional Neural Network
Image-to-image steganography is hiding one image in another image. However, hiding two secret images into one carrier image is a challenge today. The application of image steganography based on deep learning in real-life is relatively rare. In this paper,
Xintao Duan +4 more
doaj +1 more source
Recent Advances of Image Steganography With Generative Adversarial Networks
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014, has achieved great success. There have been increasing research achievements based on GAN in the field of computer vision and natural language processing.
Jia Liu +6 more
doaj +1 more source
Image Steganography: A Review of the Recent Advances
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Nandhini Subramanian +3 more
doaj +1 more source
Principles and overview of network steganography [PDF]
7 pages, 3 ...
Lubacz, Jozef +2 more
openaire +2 more sources
Invisible steganography via generative adversarial networks [PDF]
13 pages, 7 ...
Zhang, Ru, Dong, Shiqi, Liu, Jianyi
openaire +2 more sources
Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography.
Zhujun Jin +3 more
doaj +1 more source
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks
The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage.
Kangyi Ding +6 more
doaj +1 more source

