Results 51 to 60 of about 6,079 (176)
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg +3 more
core +1 more source
Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection
Deep neural networks (DNN) are applied in various fields because they afford good performance. However, they seem vulnerable to adversarial examples. Therefore, studies are actively investigating adversarial defenses to improve the robustness of DNNs as ...
Hyunsik Na, Gwonsang Ryu, Daeseon Choi
doaj +1 more source
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil +4 more
wiley +1 more source
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong +4 more
core +2 more sources
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy +3 more
wiley +1 more source
Steganalysis of Chat based Steganography
Steganalysis is the practice of identifying potential secret communication and taking appropriate action, such as deciphering to uncover the hidden contents or destroying the object containing the hidden information if it cannot be uncovered. At times, it’s very necessary to perform Steganalysis due to the fact that steganography is often ...
openaire +2 more sources
Abstract The purpose of this study is to analyze the grammatical complexity features of international teaching assistants' (ITAs) mock‐teaching presentations and to compare the distributions of these features to those found in the Oral English Proficiency Test (a local ITA assessment), university classroom teaching, conversation, and academic writing ...
Heesun Chang, Amin Raeisi‐Vanani
wiley +1 more source
The secure steganography for hiding images via GAN
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj +1 more source
Wavelet‐Based Texture Mining and Enhancement for Face Forgery Detection
Due to the abuse of deep forgery technology, the research on forgery detection methods has become increasingly urgent. The corresponding relationship between the frequency spectrum information and the spatial clues, which is often neglected by current methods, could be conducive to a more accurate and generalized forgery detection.
Xin Li +4 more
wiley +1 more source
Steganographic Generative Adversarial Networks
Steganography is collection of methods to hide secret information ("payload") within non-secret information "container"). Its counterpart, Steganalysis, is the practice of determining if a message contains a hidden payload, and recovering it if possible.
Burnaev, Evgeny +2 more
core +1 more source

