Results 31 to 40 of about 53,525 (364)
Provably Secure Generative Linguistic Steganography [PDF]
Generative linguistic steganography mainly utilized language models and applied steganographic sampling (stegosampling) to generate high-security steganographic text (stegotext). However, previous methods generally lead to statistical differences between
Siyu Zhang+3 more
semanticscholar +1 more source
Binary image steganography method based on layered embedding
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG+3 more
doaj +3 more sources
Code wars: steganography, signals intelligence, and terrorism [PDF]
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid+11 more
core +2 more sources
Steganography in VLC Systems [PDF]
JUCS - Journal of Universal Computer Science Volume Nr.
Blinowski,Grzegorz+1 more
openaire +3 more sources
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models
Steganography is the art and science of hiding secret messages in public communication so that the presence of secret messages cannot be detected. There are two distribution-preserving steganographic frameworks, one is sampler-based and the other is ...
Kejiang Chen+5 more
semanticscholar +1 more source
Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography [PDF]
The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding.
Zihan Wang+7 more
semanticscholar +1 more source
A novel steganography approach for audio files [PDF]
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T+2 more
core +1 more source
Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model [PDF]
With advances in neural language models, the focus of linguistic steganography has shifted from edit-based approaches to generation-based ones. While the latter’s payload capacity is impressive, generating genuine-looking texts remains challenging.
Honai Ueoka, Yugo Murawaki, S. Kurohashi
semanticscholar +1 more source
A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany+3 more
doaj +1 more source
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret message is being sent and its
Yendluri Lohith JayaSurya+2 more
openaire +2 more sources