Results 311 to 320 of about 56,459 (364)
Some of the next articles are maybe not open access.

Steganography Embedding Cost Learning With Generative Multi-Adversarial Network

IEEE Transactions on Information Forensics and Security
Since the generative adversarial network (GAN) was proposed by Ian Goodfellow et al. in 2014, it has been widely used in various fields. However, there are only a few works related to image steganography so far.
Dongxia Huang   +4 more
semanticscholar   +1 more source

Generative Steganography Based on Long Readable Text Generation

IEEE Transactions on Computational Social Systems
Text steganography has received a lot of attention in the application of covert communication. How to ensure desirable capacity and imperceptibility has become a key issue in text steganography.
Yi Cao   +6 more
semanticscholar   +1 more source

A Robust Coverless Steganography Scheme Using Camouflage Image

IEEE transactions on circuits and systems for video technology (Print), 2022
Recently, most coverless image steganography (CIS) methods are based on robust mapping rules. However, due to the limited mapping expression relationship between secret information and hash sequence, it is a challenge to further improve the hiding ...
Qiang Liu   +4 more
semanticscholar   +1 more source

RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

IEEE Transactions on Information Forensics and Security, 2019
Linguistic steganography based on text carrier auto-generation technology is a current topic with great promise and challenges. Limited by the text automatic generation technology or the corresponding text coding methods, the quality of the ...
Zhong-Liang Yang   +2 more
exaly   +2 more sources

Image Steganography in Color Conversion

IEEE Transactions on Circuits and Systems - II - Express Briefs
For image steganography, no matter how ingenious the distortion function is designed, the embedding operation will lead to changes in the distribution of cover image, which causes security risks.
Qi Li   +4 more
semanticscholar   +1 more source

A New Payload Partition Strategy in Color Image Steganography

IEEE transactions on circuits and systems for video technology (Print), 2020
In traditional steganographic schemes, RGB three channels payloads are assigned equally in a true color image. In fact, the security of color image steganography relates not only to data-embedding algorithms but also to different payload partition.
Xin Liao   +4 more
semanticscholar   +1 more source

Coverless Image Steganography Based on Multi-Object Recognition

IEEE transactions on circuits and systems for video technology (Print), 2021
Most of the existing coverless steganography approaches have poor robustness to geometric attacks, because these approaches use features of the entire image to map information, and these features are easy to be lost when being attacked.
Yuanjing Luo   +3 more
semanticscholar   +1 more source

Compression‐based steganography

Concurrency and Computation: Practice and Experience, 2019
SummaryConventional privacy‐enforcement mechanisms, such as encryption‐based ones, are frequently used to prevent third‐party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in ...
Carpentieri B.   +4 more
openaire   +2 more sources

Steganography and classification of image steganography techniques

2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire   +1 more source

Home - About - Disclaimer - Privacy