Results 21 to 30 of about 56,459 (364)
A robust audio steganography algorithm based on differential evolution
Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is ...
Zhaopin SU +4 more
doaj +2 more sources
Survey on image non-additive steganography
Image non-additive steganography not only can better maintain the distribution of image elements, but also has high detection resistance.Firstly, the image non-additive image steganography methods were sorted out and divided into two major categories ...
Yaofei WANG +4 more
doaj +3 more sources
Steganography - INTRODUCTION TO STEGANOGRAPHY
Steganography - INTRODUCTION TO ...
openaire +2 more sources
Statistical feature-based steganalysis for pixel-value differencing steganography
Pixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods.
Wen-Bin Lin, Tai-Hung Lai, Ko-Chin Chang
doaj +1 more source
Deep Image Steganography Using Transformer and Recursive Permutation
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang +3 more
doaj +1 more source
Perfectly Secure Steganography Using Minimum Entropy Coupling [PDF]
Steganography is the practice of encoding secret information into innocuous content in such a manner that an adversarial third party would not realize that there is hidden meaning.
C. S. D. Witt +4 more
semanticscholar +1 more source
Code wars: steganography, signals intelligence, and terrorism [PDF]
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid +11 more
core +2 more sources
Binary image steganography method based on layered embedding
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG +3 more
doaj +3 more sources
Provably Secure Generative Linguistic Steganography [PDF]
Generative linguistic steganography mainly utilized language models and applied steganographic sampling (stegosampling) to generate high-security steganographic text (stegotext). However, previous methods generally lead to statistical differences between
Siyu Zhang +3 more
semanticscholar +1 more source
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions [PDF]
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Boudreau, Eric +4 more
core +3 more sources

