Results 11 to 20 of about 53,525 (364)
CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images.
Jiwen Yu+3 more
semanticscholar +1 more source
RoSteALS: Robust Steganography using Autoencoder Latent Space [PDF]
Data hiding such as steganography and invisible watermarking has important applications in copyright protection, privacy-preserved communication and content provenance.
Tu Bui+3 more
semanticscholar +1 more source
Large-Capacity and Flexible Video Steganography via Invertible Neural Network [PDF]
Video steganography is the art of unobtrusively concealing secret data in a cover video and then recovering the secret data through a decoding protocol at the receiver end.
Chong Mou+5 more
semanticscholar +1 more source
Secret-to-Image Reversible Transformation for Generative Steganography [PDF]
Recently, generative steganography that transforms secret information to a generated image has been a promising technique to resist steganalysis detection.
Zhili Zhou+6 more
semanticscholar +1 more source
Video steganography: recent advances and challenges
Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high capacity as well as complex structure make them more preferable for choosing as cover media over other media ...
Jayakanth Kunhoth+3 more
semanticscholar +1 more source
Generative Steganography Network [PDF]
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...
Ping Wei+5 more
semanticscholar +1 more source
Perfectly Secure Steganography Using Minimum Entropy Coupling [PDF]
Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party would not realize that there is hidden meaning.
C. S. D. Witt+4 more
semanticscholar +1 more source
Quantum Image Steganography Schemes for Data Hiding: A Survey
Quantum steganography plays a critical role in embedding confidential data into carrier messages using quantum computing schemes. The quantum variant of steganography outperforms its classical counterpart from security, embedding efficiency and capacity,
Nasro Min-Allah+7 more
doaj +1 more source
JPEG steganography with particle swarm optimization accelerated by AVX [PDF]
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B+7 more
core +1 more source
A Review on Security Techniques in Image Steganography
Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information.
Sami Ghoul+2 more
semanticscholar +1 more source