Results 21 to 30 of about 8,564 (282)

Robust Image Steganography Based on Prior Distribution Resistant to JPEG Compression [PDF]

open access: yesJisuanji gongcheng
Because the compression process of the network channel is unknown, attacks on the image after social network transmission are difficult to predict. Therefore, studying the steganography algorithm resistant to the compression distortion of a channel is ...
LIU Ting, DONG Li, YAN Diqun, WANG Rangding
doaj   +1 more source

Arabic Language Text Steganography Based on Singular Value Decomposition (SVD) [PDF]

open access: yesEngineering and Technology Journal, 2016
With the fast development of internet innocent over communication in the network environment has become an important research direction. Steganography means that secret information is embedded into cover data imperceptibly for transmission.
Hanaa M. Ahmed, a A. A. Khohder, Maisa
doaj   +1 more source

Detecting fingerprints of audio steganography software

open access: yesForensic Science International: Reports, 2020
Steganography has experienced rapidly growth with spreading access to the Internet in recent decades. Such low cost, simple process and easy promotion steganographic softwares pose serious and growing threats and challenges to network security.
Chen Gong   +5 more
doaj   +1 more source

Securing Fixed Neural Network Steganography

open access: yesProceedings of the 31st ACM International Conference on Multimedia, 2023
Image steganography is the art of concealing secret information in images in a way that is imperceptible to unauthorized parties. Recent advances show that is possible to use a fixed neural network (FNN) for secret embedding and extraction. Such fixed neural network steganography (FNNS) achieves high steganographic performance without training the ...
Zicong Luo   +4 more
openaire   +2 more sources

Towards Deep Network Steganography: From Networks to Networks

open access: yes, 2023
With the widespread applications of the deep neural network (DNN), how to covertly transmit the DNN models in public channels brings us the attention, especially for those trained for secret-learning tasks. In this paper, we propose deep network steganography for the covert communication of DNN models.
Li, Guobiao   +4 more
openaire   +2 more sources

Adaptive Image Steganography Against JPEG Compression [PDF]

open access: yesJisuanji kexue
Existing network communication systems often employ JPEG compression to reduce communication overhead when transmitting images.However,traditional image steganography techniques lack the ability to withstand JPEG compression.After performing lossy ...
ZHANG Jinghan, CHEN Wen
doaj   +1 more source

The secure steganography for hiding images via GAN

open access: yesEURASIP Journal on Image and Video Processing, 2020
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj   +1 more source

Secure communication over wireless sensor network using image steganography with generative adversarial networks

open access: yesMeasurement: Sensors, 2022
Over the last several years, various researchers have been driven to the challenge of addressing security issues in Wireless Sensor Networks (WSN). Steganography is one of the most secure encryption techniques used for network security around the globe ...
Ambika   +2 more
doaj   +1 more source

StegoPNet: Image Steganography With Generalization Ability Based on Pyramid Pooling Module

open access: yesIEEE Access, 2020
In terms of payload capacity and visual effects, the existing image steganography technology based on deep neural networks still needs improvement, to solve this problem, this article proposes a new deep convolutional steganography network based on the ...
Xintao Duan   +5 more
doaj   +1 more source

COVERT CHANNEL TECHNIQUE BASED ON STREAMING PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2018
The paper presents analysis of modern network covert channels. The authors set forward a hypothesis of effective streaming protocol usage for covert channel creating. Covert channel technique for open networks is proposed.
Shipulin P.M., Kozin V.V, Shniperov A.N.
doaj   +1 more source

Home - About - Disclaimer - Privacy