Results 21 to 30 of about 8,564 (282)
Robust Image Steganography Based on Prior Distribution Resistant to JPEG Compression [PDF]
Because the compression process of the network channel is unknown, attacks on the image after social network transmission are difficult to predict. Therefore, studying the steganography algorithm resistant to the compression distortion of a channel is ...
LIU Ting, DONG Li, YAN Diqun, WANG Rangding
doaj +1 more source
Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj +1 more source
Detecting fingerprints of audio steganography software
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong +5 more
doaj +1 more source
Securing Fixed Neural Network Steganography
Image steganography is the art of concealing secret information in images in a way that is imperceptible to unauthorized parties. Recent advances show that is possible to use a fixed neural network (FNN) for secret embedding and extraction. Such fixed neural network steganography (FNNS) achieves high steganographic performance without training the ...
Zicong Luo +4 more
openaire +2 more sources
Towards Deep Network Steganography: From Networks to Networks
With the widespread applications of the deep neural network (DNN), how to covertly transmit the DNN models in public channels brings us the attention, especially for those trained for secret-learning tasks. In this paper, we propose deep network steganography for the covert communication of DNN models.
Li, Guobiao +4 more
openaire +2 more sources
Adaptive Image Steganography Against JPEG Compression [PDF]
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj +1 more source
The secure steganography for hiding images via GAN
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj +1 more source
Over the last several years, various researchers have been driven to the challenge of addressing security issues in Wireless Sensor Networks (WSN). Steganography is one of the most secure encryption techniques used for network security around the globe ...
Ambika +2 more
doaj +1 more source
StegoPNet: Image Steganography With Generalization Ability Based on Pyramid Pooling Module
In terms of payload capacity and visual effects, the existing image steganography technology based on deep neural networks still needs improvement, to solve this problem, this article proposes a new deep convolutional steganography network based on the ...
Xintao Duan +5 more
doaj +1 more source
COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj +1 more source

