Results 341 to 350 of about 53,608 (389)
Some of the next articles are maybe not open access.

Robust Invertible Image Steganography

Computer Vision and Pattern Recognition, 2022
Image steganography aims to hide secret images into a container image, where the secret is hidden from human vision and can be restored when necessary.
You-song Xu   +4 more
semanticscholar   +1 more source

Large-capacity Image Steganography Based on Invertible Neural Networks

Computer Vision and Pattern Recognition, 2021
Many attempts have been made to hide information in images, where one main challenge is how to increase the payload capacity without the container image being detected as containing a message.
Shao-Ping Lu   +3 more
semanticscholar   +1 more source

VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder

IEEE Transactions on Information Forensics and Security, 2021
In recent years, linguistic steganography based on text auto-generation technology has been greatly developed, which is considered to be a very promising but also a very challenging research topic.
Zhongliang Yang   +4 more
semanticscholar   +1 more source

Image Disentanglement Autoencoder for Steganography without Embedding

Computer Vision and Pattern Recognition, 2022
Conventional steganography approaches embed a secret message into a carrier for concealed communication but are prone to attack by recent advanced steganalysis tools.
Xiyao Liu   +5 more
semanticscholar   +1 more source

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning

IEEE Transactions on Information Forensics and Security, 2021
Automatic cost learning for steganography based on deep neural networks is receiving increasing attention. Steganographic methods under such a framework have been shown to achieve better security performance than methods adopting hand-crafted costs ...
Weixuan Tang   +4 more
semanticscholar   +1 more source

A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network

open access: yesIEEE Access, 2020
Image steganography is a technology that hides sensitive information into an image. The traditional image steganography method tends to securely embed secret information in the host image so that the payload capacity is almost ignored and the ...
Baoxia Li, Daidou Guo, Mengxiao Gou
exaly   +3 more sources

A Proficient and secure way of Transmission using Cryptography and Steganography

2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS), 2022
People are concerned about the security of their data over the internet. The data can be protected in many ways to keep unauthorized individuals from accessing it. To secure data, steganography can be used in conjunction with cryptography.
G. D. Reddy   +5 more
semanticscholar   +1 more source

Steganography and classification of image steganography techniques

2014 International Conference on Computing for Sustainable Global Development (INDIACom), 2014
Information is wealth of any organization and in present era in which information transferred through digital media and internet, it became a top priority for any organizations to protect this wealth. Whatever technique we adopt for the security purpose, the degree and level of security always remains top concern. Steganography is one such technique in
Sumeet Kaur   +2 more
openaire   +2 more sources

Deep learning based image steganography: A review

WIREs Data. Mining. Knowl. Discov., 2022
A review of the deep learning based image steganography techniques is presented in this paper. For completeness, the recent traditional steganography techniques are also discussed briefly.
M. Wani, Bisma Sultan
semanticscholar   +1 more source

Coverless Image Steganography Based on Multi-Object Recognition

IEEE transactions on circuits and systems for video technology (Print), 2021
Most of the existing coverless steganography approaches have poor robustness to geometric attacks, because these approaches use features of the entire image to map information, and these features are easy to be lost when being attacked.
Yuanjing Luo   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy