Results 231 to 240 of about 8,674 (276)
Super-resolution deep neural network (SRDNN) based multi-image steganography for highly secured lossless image transmission. [PDF]
Priya S +3 more
europepmc +1 more source
Robust zero-watermarking for color images using hybrid deep learning models and encryption. [PDF]
Gharib HA, Abdelnapi NMM, Hosny KM.
europepmc +1 more source
Security-oriented steganographic payload allocation for multi-remote sensing images. [PDF]
Wu T, Hu X, Liu C.
europepmc +1 more source
Multi-carrier information hiding based on projection-driven vertex embedding in 3D models. [PDF]
Ou Y +5 more
europepmc +1 more source
Oculoplastics and Augmented Intelligence: A Literature Review. [PDF]
Ing E, Bondok M.
europepmc +1 more source
Principles and overview of network steganography [PDF]
7 pages, 3 ...
Wojciech Mazurczyk +1 more
exaly +3 more sources
Multilayer Detection of Network Steganography [PDF]
This paper presents a new method for steganography detection in network protocols. The method is based on a multilayer approach for the selective analysis of derived and aggregated metrics utilizing machine learning algorithms. The main objective is to provide steganalysis capability for networks with large numbers of devices and connections.
Krzysztof Szczypiorski
exaly +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Steganography in WiMAX networks
2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2013The main subject of this work is to propose and analyze steganographic systems using WiMAX (802.16-2004) networks physical layer (PHY). According to this, two new systems were described. These proposals allow to create additional, hidden for unauthorized users channels used to transmission of secret messages.
Iwona Grabska, Krzysztof Szczypiorski
openaire +1 more source
Batch Steganography via Generative Network
IEEE Transactions on Circuits and Systems for Video Technology, 2021Batch steganography is a technique that hides information into multiple covers. To achieve a better performance on the security of data hiding, we propose a novel strategy of batch steganography using a generative network. In this method, the approaches of cover selection, payload allocation, and distortion evaluation are considered in the round.
Nan Zhong +4 more
openaire +1 more source

