Results 51 to 60 of about 3,326 (205)

Hiding image with inception transformer

open access: yesIET Image Processing, Volume 18, Issue 13, Page 3961-3975, 13 November 2024.
In this article, we proposed a novel image steganography framework called HiiT, which takes advantage of CNN and Transformer to learn both the local and global pixel correlation in image hiding. Specifically, we propose a new Transformer structure called Inception Transformer, which incorporates the Inception Net in the attention‐based Transformer ...
Yunyun Dong   +5 more
wiley   +1 more source

The secure steganography for hiding images via GAN

open access: yesEURASIP Journal on Image and Video Processing, 2020
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj   +1 more source

Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning based techniques

open access: yesIET Image Processing, 2021
Steganography, a branch of data hiding techniques aims to hide confidential information within any digital media by obscuring the existence of hidden information. On the contrary, steganalysis aims to detect steganography.
Arivazhagan Selvaraj   +3 more
doaj   +1 more source

Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

open access: yesIET Image Processing, Volume 18, Issue 13, Page 4189-4206, 13 November 2024.
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value.
Wassim Alexan   +5 more
wiley   +1 more source

Information hiding using approximate POSIT representation

open access: yesIET Image Processing, Volume 18, Issue 13, Page 4221-4249, 13 November 2024.
Ensure security level by hiding data using POSIT and AC at LSB of binary representation and floating‐point value to achieve higher accuracy as compared to IEEE‐754 data format and binary number representation. Enhance the security of hiding data into pixels of black/white and ARGB images by employing two options; option 1 utilizes one digit from each ...
Sa'ed Abed   +2 more
wiley   +1 more source

VidaGAN: Adaptive GAN for image steganography

open access: yesIET Image Processing, Volume 18, Issue 12, Page 3329-3342, 16 October 2024.
This study introduces a steganography framework named VarIable aDAptive GAN that utilizes deep learning techniques. It also introduces a novel method for embedding any type of binary data into images using generative adversarial networks, enabling us to enhance the visual appeal of images generated by the specified model.
Vida Yousefi Ramandi   +2 more
wiley   +1 more source

Steganalisis Blind dengan Metode Convolutional Neural Network (CNN) Yedroudj- Net terhadap Tools Steganografi

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2020
Steganalisis digunakan untuk mendeteksi ada atau tidaknya file steganografi. Salah satu kategori steganalisis adalah blind steganalisis, yaitu cara untuk mendeteksi file rahasia tanpa mengetahui metode steganografi apa yang digunakan.
Nurmi Hidayasari   +2 more
doaj   +1 more source

AI‐generated video steganography based on semantic segmentation

open access: yesIET Image Processing, Volume 18, Issue 11, Page 3042-3054, 18 September 2024.
This paper proposes an AI‐generated video steganography algorithm based on semantic segmentation and histogram embedding. The stego video generated in the scheme has strong robustness against various noise attacks and security for anti‐steganalysis.
Yangping Lin   +4 more
wiley   +1 more source

Video steganalysis scheme based on inter-frame collusion

open access: yesTongxin xuebao, 2009
An inter-frame collusion based video steganalysis scheme(ICS) was proposed by utilizing the temporal corre-lation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video se-quence decreased the ...
LIU Bin, LIU Fen-lin, YANG Chun-fang
doaj   +2 more sources

Hiding image into image with hybrid attention mechanism based on GANs

open access: yesIET Image Processing, Volume 18, Issue 10, Page 2679-2689, 21 August 2024.
We introduce a novel network architecture for image steganography with hybrid attention mechanism based on generative adversarial network. Our model consists of three essential components: a generator, an extractor, and a discriminator. Specifically, we have designed a HAM to guide both the current hiding and extraction processes, aiming to improve the
Yuling Zhu   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy