Results 21 to 30 of about 8,587 (278)

IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography.
Zhujun Jin   +3 more
doaj   +1 more source

A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks

open access: yesSensors, 2022
The Internet has become the main channel of information communication, which contains a large amount of secret information. Although network communication provides a convenient channel for human communication, there is also a risk of information leakage.
Kangyi Ding   +6 more
doaj   +1 more source

Robust Image Steganography Based on Prior Distribution Resistant to JPEG Compression [PDF]

open access: yesJisuanji gongcheng
Because the compression process of the network channel is unknown, attacks on the image after social network transmission are difficult to predict. Therefore, studying the steganography algorithm resistant to the compression distortion of a channel is ...
LIU Ting, DONG Li, YAN Diqun, WANG Rangding
doaj   +1 more source

Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]

open access: yesEngineering and Technology Journal, 2016
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj   +1 more source

Securing Fixed Neural Network Steganography

open access: yesProceedings of the 31st ACM International Conference on Multimedia, 2023
Image steganography is the art of concealing secret information in images in a way that is imperceptible to unauthorized parties. Recent advances show that is possible to use a fixed neural network (FNN) for secret embedding and extraction. Such fixed neural network steganography (FNNS) achieves high steganographic performance without training the ...
Zicong Luo   +4 more
openaire   +2 more sources

Detecting fingerprints of audio steganography software

open access: yesForensic Science International: Reports, 2020
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong   +5 more
doaj   +1 more source

Towards Deep Network Steganography: From Networks to Networks

open access: yes, 2023
With the widespread applications of the deep neural network (DNN), how to covertly transmit the DNN models in public channels brings us the attention, especially for those trained for secret-learning tasks. In this paper, we propose deep network steganography for the covert communication of DNN models.
Li, Guobiao   +4 more
openaire   +2 more sources

Adaptive Image Steganography Against JPEG Compression [PDF]

open access: yesJisuanji kexue
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj   +1 more source

The secure steganography for hiding images via GAN

open access: yesEURASIP Journal on Image and Video Processing, 2020
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj   +1 more source

Secure communication over wireless sensor network using image steganography with generative adversarial networks

open access: yesMeasurement: Sensors, 2022
Over the last several years, various researchers have been driven to the challenge of addressing security issues in Wireless Sensor Networks (WSN). Steganography is one of the most secure encryption techniques used for network security around the globe ...
Ambika   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy