Results 21 to 30 of about 56,459 (364)

A robust audio steganography algorithm based on differential evolution

open access: yesDianxin kexue, 2021
Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is ...
Zhaopin SU   +4 more
doaj   +2 more sources

Survey on image non-additive steganography

open access: yes网络与信息安全学报, 2021
Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories ...
Yaofei WANG   +4 more
doaj   +3 more sources

Statistical feature-based steganalysis for pixel-value differencing steganography

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
Pixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods.
Wen-Bin Lin, Tai-Hung Lai, Ko-Chin Chang
doaj   +1 more source

Deep Image Steganography Using Transformer and Recursive Permutation

open access: yesEntropy, 2022
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang   +3 more
doaj   +1 more source

Perfectly Secure Steganography Using Minimum Entropy Coupling [PDF]

open access: yesInternational Conference on Learning Representations, 2022
Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party would not realize that there is hidden meaning.
C. S. D. Witt   +4 more
semanticscholar   +1 more source

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

Binary image steganography method based on layered embedding

open access: yes网络与信息安全学报, 2021
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG   +3 more
doaj   +3 more sources

Provably Secure Generative Linguistic Steganography [PDF]

open access: yesFindings, 2021
Generative linguistic steganography mainly utilized language models and applied steganographic sampling (stegosampling) to generate high-security steganographic text (stegotext). However, previous methods generally lead to statistical differences between
Siyu Zhang   +3 more
semanticscholar   +1 more source

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions [PDF]

open access: yes, 1999
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Boudreau, Eric   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy