Results 11 to 20 of about 56,459 (364)

A Review on Security Techniques in Image Steganography [PDF]

open access: diamondInternational Journal of Advanced Computer Science and Applications, 2023
Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information.
Sami Ghoul   +2 more
openalex   +2 more sources

CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]

open access: yesNeural Information Processing Systems, 2023
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images.
Jiwen Yu   +3 more
semanticscholar   +1 more source

RoSteALS: Robust Steganography using Autoencoder Latent Space [PDF]

open access: yes2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2023
Data hiding such as steganography and invisible watermarking has important applications in copyright protection, privacy-preserved communication and content provenance.
Tu Bui   +3 more
semanticscholar   +1 more source

Large-Capacity and Flexible Video Steganography via Invertible Neural Network [PDF]

open access: yesComputer Vision and Pattern Recognition, 2023
Video steganography is the art of unobtrusively concealing secret data in a cover video and then recovering the secret data through a decoding protocol at the receiver end.
Chong Mou   +5 more
semanticscholar   +1 more source

PRIS: Practical robust invertible network for image steganography [PDF]

open access: yesEngineering applications of artificial intelligence, 2023
Image steganography is a technique of hiding secret information inside another image, so that the secret is not visible to human eyes and can be recovered when needed.
Hang Yang   +3 more
semanticscholar   +1 more source

Video steganography: recent advances and challenges

open access: yesMultimedia tools and applications, 2023
Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high capacity as well as complex structure make them more preferable for choosing as cover media over other media ...
Jayakanth Kunhoth   +3 more
semanticscholar   +1 more source

Secret-to-Image Reversible Transformation for Generative Steganography [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2022
Recently, generative steganography that transforms secret information to a generated image has been a promising technique to resist steganalysis detection.
Zhili Zhou   +6 more
semanticscholar   +1 more source

Image Steganography: A Review of the Recent Advances

open access: yesIEEE Access, 2021
Image Steganography is the process of hiding information which can be text, image or video inside a cover image. The secret information is hidden in a way that it not visible to the human eyes.
Nandhini Subramanian   +3 more
semanticscholar   +1 more source

High performance image steganography integrating IWT and Hamming code within secret sharing

open access: yesIET Image Processing, 2023
Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct ...
Zahra Saeidi   +4 more
semanticscholar   +1 more source

Generative Steganography Network [PDF]

open access: yesACM Multimedia, 2022
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...
Ping Wei   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy