Results 11 to 20 of about 53,525 (364)

CRoSS: Diffusion Model Makes Controllable, Robust and Secure Image Steganography [PDF]

open access: yesNeural Information Processing Systems, 2023
Current image steganography techniques are mainly focused on cover-based methods, which commonly have the risk of leaking secret images and poor robustness against degraded container images.
Jiwen Yu   +3 more
semanticscholar   +1 more source

RoSteALS: Robust Steganography using Autoencoder Latent Space [PDF]

open access: yes2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), 2023
Data hiding such as steganography and invisible watermarking has important applications in copyright protection, privacy-preserved communication and content provenance.
Tu Bui   +3 more
semanticscholar   +1 more source

Large-Capacity and Flexible Video Steganography via Invertible Neural Network [PDF]

open access: yesComputer Vision and Pattern Recognition, 2023
Video steganography is the art of unobtrusively concealing secret data in a cover video and then recovering the secret data through a decoding protocol at the receiver end.
Chong Mou   +5 more
semanticscholar   +1 more source

Secret-to-Image Reversible Transformation for Generative Steganography [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, 2022
Recently, generative steganography that transforms secret information to a generated image has been a promising technique to resist steganalysis detection.
Zhili Zhou   +6 more
semanticscholar   +1 more source

Video steganography: recent advances and challenges

open access: yesMultimedia tools and applications, 2023
Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high capacity as well as complex structure make them more preferable for choosing as cover media over other media ...
Jayakanth Kunhoth   +3 more
semanticscholar   +1 more source

Generative Steganography Network [PDF]

open access: yesACM Multimedia, 2022
Steganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...
Ping Wei   +5 more
semanticscholar   +1 more source

Perfectly Secure Steganography Using Minimum Entropy Coupling [PDF]

open access: yesInternational Conference on Learning Representations, 2022
Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party would not realize that there is hidden meaning.
C. S. D. Witt   +4 more
semanticscholar   +1 more source

Quantum Image Steganography Schemes for Data Hiding: A Survey

open access: yesApplied Sciences, 2022
Quantum steganography plays a critical role in embedding confidential data into carrier messages using quantum computing schemes. The quantum variant of steganography outperforms its classical counterpart from security, embedding efficiency and capacity,
Nasro Min-Allah   +7 more
doaj   +1 more source

JPEG steganography with particle swarm optimization accelerated by AVX [PDF]

open access: yes, 2020
Digital steganography aims at hiding secret messages in digital data transmitted over insecure channels. The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.
Bramas B   +7 more
core   +1 more source

A Review on Security Techniques in Image Steganography

open access: yesInternational Journal of Advanced Computer Science and Applications, 2023
Given the increased popularity of the internet, the exchange of sensitive information leads to concerns about privacy and security. Techniques such as steganography and cryptography have been employed to protect sensitive information.
Sami Ghoul   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy