Results 11 to 20 of about 23,715 (170)

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +3 more sources

Eigenfaces-Based Steganography [PDF]

open access: yesEntropy, 2021
In this paper we propose a novel transform domain steganography technique—hiding a message in components of linear combination of high order eigenfaces vectors. By high order we mean eigenvectors responsible for dimensions with low amount of overall image variance, which are usually related to high-frequency parameters of image (details).
Tomasz Hachaj   +2 more
openaire   +3 more sources

Deep Image Steganography Using Transformer and Recursive Permutation

open access: yesEntropy, 2022
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang   +3 more
doaj   +1 more source

A novel steganography approach for audio files [PDF]

open access: yes, 2020
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T   +2 more
core   +1 more source

Statistical feature-based steganalysis for pixel-value differencing steganography

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
Pixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods.
Wen-Bin Lin, Tai-Hung Lai, Ko-Chin Chang
doaj   +1 more source

On the Gold Standard for Security of Universal Steganography [PDF]

open access: yes, 2018
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persistent attempts to solve them.
A Kiayias   +30 more
core   +2 more sources

Binary image steganography method based on layered embedding

open access: yes网络与信息安全学报, 2021
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG   +3 more
doaj   +3 more sources

A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers

open access: yesApplied Sciences, 2023
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany   +3 more
doaj   +1 more source

Steganography Security: Principle and Practice

open access: yesIEEE Access, 2018
This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances.
Yan Ke   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy