Results 311 to 320 of about 56,459 (364)
Some of the next articles are maybe not open access.
Steganography Embedding Cost Learning With Generative Multi-Adversarial Network
IEEE Transactions on Information Forensics and SecuritySince the generative adversarial network (GAN) was proposed by Ian Goodfellow et al. in 2014, it has been widely used in various fields. However, there are only a few works related to image steganography so far.
Dongxia Huang +4 more
semanticscholar +1 more source
Generative Steganography Based on Long Readable Text Generation
IEEE Transactions on Computational Social SystemsText steganography has received a lot of attention in the application of covert communication. How to ensure desirable capacity and imperceptibility has become a key issue in text steganography.
Yi Cao +6 more
semanticscholar +1 more source
A Robust Coverless Steganography Scheme Using Camouflage Image
IEEE transactions on circuits and systems for video technology (Print), 2022Recently, most coverless image steganography (CIS) methods are based on robust mapping rules. However, due to the limited mapping expression relationship between secret information and hash sequence, it is a challenge to further improve the hiding ...
Qiang Liu +4 more
semanticscholar +1 more source
RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
IEEE Transactions on Information Forensics and Security, 2019Linguistic steganography based on text carrier auto-generation technology is a current topic with great promise and challenges. Limited by the text automatic generation technology or the corresponding text coding methods, the quality of the ...
Zhong-Liang Yang +2 more
exaly +2 more sources
Image Steganography in Color Conversion
IEEE Transactions on Circuits and Systems - II - Express BriefsFor image steganography, no matter how ingenious the distortion function is designed, the embedding operation will lead to changes in the distribution of cover image, which causes security risks.
Qi Li +4 more
semanticscholar +1 more source
A New Payload Partition Strategy in Color Image Steganography
IEEE transactions on circuits and systems for video technology (Print), 2020In traditional steganographic schemes, RGB three channels payloads are assigned equally in a true color image. In fact, the security of color image steganography relates not only to data-embedding algorithms but also to different payload partition.
Xin Liao +4 more
semanticscholar +1 more source
Coverless Image Steganography Based on Multi-Object Recognition
IEEE transactions on circuits and systems for video technology (Print), 2021Most of the existing coverless steganography approaches have poor robustness to geometric attacks, because these approaches use features of the entire image to map information, and these features are easy to be lost when being attacked.
Yuanjing Luo +3 more
semanticscholar +1 more source
Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research
Neurocomputing, 2019Inas Jawad Kadhim +2 more
exaly +2 more sources
Compression‐based steganography
Concurrency and Computation: Practice and Experience, 2019SummaryConventional privacy‐enforcement mechanisms, such as encryption‐based ones, are frequently used to prevent third‐party eavesdroppers to intercept confidential information exchanged between two or more parties. However, the use of such mechanisms can be perceivable and it alerts the involved intercepting entities that could devote some effort in ...
Carpentieri B. +4 more
openaire +2 more sources
Steganography and classification of image steganography techniques
2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur, Savina Bansal, R. K. Bansal
openaire +1 more source

