Results 31 to 40 of about 47,392 (384)

A robust audio steganography algorithm based on differential evolution

open access: yesDianxin kexue, 2021
Audio steganography is to hide secret information into the audio carrier and has become a research hotspot in the field of information hiding.Most of the existing studies focus on minimizing distortion at the expense of steganography capacity, and it is ...
Zhaopin SU   +4 more
doaj   +2 more sources

Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography [PDF]

open access: yesIEEE Transactions on Computational Social Systems, 2021
The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding.
Zihan Wang   +7 more
semanticscholar   +1 more source

A Cryptographic Approach for Steganography [PDF]

open access: yes2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013
In this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains.
Bahi, Jacques   +2 more
openaire   +5 more sources

Statistical feature-based steganalysis for pixel-value differencing steganography

open access: yesEURASIP Journal on Advances in Signal Processing, 2021
Pixel-value differencing (PVD) steganography is a popular spatial domain technology. Several PVD-based studies have proposed extended PVD steganography methods.
Wen-Bin Lin, Tai-Hung Lai, Ko-Chin Chang
doaj   +1 more source

Deep Image Steganography Using Transformer and Recursive Permutation

open access: yesEntropy, 2022
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security.
Zhiyi Wang   +3 more
doaj   +1 more source

Steganalysis of transcoding steganography [PDF]

open access: yesannals of telecommunications - annales des télécommunications, 2013
13 pages, 7 figures, 2 ...
Krzysztof Szczypiorski   +2 more
openaire   +2 more sources

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models

open access: yesIEEE Transactions on Dependable and Secure Computing, 2022
Steganography is the art and science of hiding secret messages in public communication so that the presence of secret messages cannot be detected. There are two distribution-preserving steganographic frameworks, one is sampler-based and the other is ...
Kejiang Chen   +5 more
semanticscholar   +1 more source

Robust adaptive steganography based on dither modulation and modification with re-compression [PDF]

open access: yesIEEE Transactions on Signal and Information Processing over Networks, 2021, 7: 336-345, 2020
Traditional adaptive steganography is a technique used for covert communication with high security, but it is invalid in the case of stego images are sent to legal receivers over networks which is lossy, such as JPEG compression of channels. To deal with such problem, robust adaptive steganography is proposed to enable the receiver to extract secret ...
arxiv   +1 more source

Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model [PDF]

open access: yesNorth American Chapter of the Association for Computational Linguistics, 2021
With advances in neural language models, the focus of linguistic steganography has shifted from edit-based approaches to generation-based ones. While the latter’s payload capacity is impressive, generating genuine-looking texts remains challenging.
Honai Ueoka, Yugo Murawaki, S. Kurohashi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy