Results 31 to 40 of about 53,525 (364)

Provably Secure Generative Linguistic Steganography [PDF]

open access: yesFindings, 2021
Generative linguistic steganography mainly utilized language models and applied steganographic sampling (stegosampling) to generate high-security steganographic text (stegotext). However, previous methods generally lead to statistical differences between
Siyu Zhang   +3 more
semanticscholar   +1 more source

Binary image steganography method based on layered embedding

open access: yes网络与信息安全学报, 2021
A non-additive distortion binary image steganography method was proposed which divided the cover image into two sub cover images, updated the distortion through delivering influence factor, and used the minimizing distortion codes to achieve message ...
Yuxiang CHENG   +3 more
doaj   +3 more sources

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

Steganography in VLC Systems [PDF]

open access: yesJournal of Universal Computer Science, 2017
JUCS - Journal of Universal Computer Science Volume Nr.
Blinowski,Grzegorz   +1 more
openaire   +3 more sources

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models

open access: yesIEEE Transactions on Dependable and Secure Computing, 2022
Steganography is the art and science of hiding secret messages in public communication so that the presence of secret messages cannot be detected. There are two distribution-preserving steganographic frameworks, one is sampler-based and the other is ...
Kejiang Chen   +5 more
semanticscholar   +1 more source

Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography [PDF]

open access: yesIEEE Transactions on Computational Social Systems, 2021
The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding.
Zihan Wang   +7 more
semanticscholar   +1 more source

A novel steganography approach for audio files [PDF]

open access: yes, 2020
We present a novel robust and secure steganography technique to hide images into audio files aiming at increasing the carrier medium capacity. The audio files are in the standard WAV format, which is based on the LSB algorithm while images are ...
Abdulrazzaq, Sazeen T   +2 more
core   +1 more source

Frustratingly Easy Edit-based Linguistic Steganography with a Masked Language Model [PDF]

open access: yesNorth American Chapter of the Association for Computational Linguistics, 2021
With advances in neural language models, the focus of linguistic steganography has shifted from edit-based approaches to generation-based ones. While the latter’s payload capacity is impressive, generating genuine-looking texts remains challenging.
Honai Ueoka, Yugo Murawaki, S. Kurohashi
semanticscholar   +1 more source

A Dynamic Multi-Layer Steganography Approach Based on Arabic Letters’ Diacritics and Image Layers

open access: yesApplied Sciences, 2023
Steganography is a widely used technique for concealing confidential data within images, videos, and audio. However, using text for steganography has not been sufficiently explored.
Saad Said Alqahtany   +3 more
doaj   +1 more source

Image Steganography

open access: yesInternational Journal of Recent Technology and Engineering (IJRTE), 2020
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The advantage of steganography is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography is concerned both with concealing the fact that a secret message is being sent and its
Yendluri Lohith JayaSurya   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy