Results 71 to 80 of about 6,079 (176)

JPEG Image Steganography With Automatic Embedding Cost Learning

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
A great challenge to steganography has arisen with the wide application of steganalysis methods based on convolutional neural networks (CNNs). To this end, embedding cost learning frameworks based on generative adversarial networks (GANs) has been proposed and achieved success for spatial image steganography.
Jianhua Yang   +6 more
wiley   +1 more source

Leveraging High‐Dimensional Mapping for Effective JPEG Steganalysis

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
Steganography is a critical information‐hiding technique widely used for the covert transmission of secret information on social media. In contrast, steganalysis plays a key role in ensuring information security. Although various effective steganalysis algorithms have been proposed, existing studies typically treat color images as three independent ...
Meng Xu, Xiangyang Luo, Beijing Chen
wiley   +1 more source

A Low Cost Image Steganalysis by Using Domain Adaptation

open access: yesInternational Journal of Information Science and Management, 2018
Information hiding and data encryption are used widely to protect data and information from anonymous access. In digital world, hiding and encrypting of the desired data into an image is a smart way to protect information with a low cost.
Mohammd Bagher Dastgheib   +2 more
doaj  

Steganography Defense Network Based on Simulation of Steganography Information Distribution

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
In order to block the spread of illegal stego‐image and reduce the erasing traces of steganography attacks on images, this paper proposes a steganography attack network based on simulation of steganography information distribution. First, a strategy of simulating steganography noise was adopted, and the distribution of steganography noise was learned ...
Jinjin Liu   +5 more
wiley   +1 more source

Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication

open access: yesCAAI Transactions on Intelligence Technology, Volume 9, Issue 6, Page 1435-1450, December 2024.
Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them.
Sara Charoghchi   +2 more
wiley   +1 more source

Application of Steganography for Anonymity through the Internet [PDF]

open access: yes, 2012
In this paper, a novel steganographic scheme based on chaotic iterations is proposed. This research work takes place into the information hiding security framework. The applications for anonymity and privacy through the Internet are regarded too.
Bahi, Jacques M.   +3 more
core   +1 more source

RIHINNet: A robust image hiding method against JPEG compression based on invertible neural network

open access: yesIET Image Processing, Volume 18, Issue 13, Page 3801-3814, 13 November 2024.
The loss function is designed to hide the secret image as much as possible in the area that will not change much after JPEG compression, which is helpful to improve the robustness of the model against JPEG compression. The current image‐hiding model fails to converge when it is trained robustly for all compression quality factors. Through the design of
Xin Jin   +4 more
wiley   +1 more source

Comparative Analysis of Algorithms for Detecting Hidden Information in Digital Images

open access: yesСовременные информационные технологии и IT-образование
The article provides an analysis of scientific research in the field of steganalysis of digital images, and considers the classification of steganalytic algorithms.
Andrey Bannikov, Elena Melnikova
doaj   +1 more source

Hiding image with inception transformer

open access: yesIET Image Processing, Volume 18, Issue 13, Page 3961-3975, 13 November 2024.
In this article, we proposed a novel image steganography framework called HiiT, which takes advantage of CNN and Transformer to learn both the local and global pixel correlation in image hiding. Specifically, we propose a new Transformer structure called Inception Transformer, which incorporates the Inception Net in the attention‐based Transformer ...
Yunyun Dong   +5 more
wiley   +1 more source

Calibrated Audio Steganalysis

open access: yes, 2017
7 pages, 4 figures, 3 tables, 2016 1st International Conference on New Research Achievements in Electrical and Computer Engineering, https://en.civilica.com/Paper-CBCONF01-CBCONF01_0107=Calibrated-Audio-Steganalysis ...
Ghasemzadeh, Hamzeh   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy