Results 41 to 50 of about 23,715 (170)
Applications of Deep Learning in Image Steganography [PDF]
The current paper presents the concept of steganography, with a focus on image steganography. It outlines a few relevant techniques for image steganography. Provides implementation details and a comparative evaluation of design and results.
Adrian Doroiman
doaj +1 more source
Hiding information in image using circular distribuition [PDF]
В статье рассматриваются метод скрытия информации при передаче сообщений через сеть Интернет. Основой метода является скрытие информации в носителе другого типа, или стеганография.
Al-Ani, A. A., Аль-Ани, А. А.
core
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Liśkiewicz, Maciej +2 more
openaire +1 more source
A Survey on different techniques of steganography
Steganography is important due to the exponential development and secret communication of potential computer users over the internet. Steganography is the art of invisible communication to keep secret information inside other information. Steganalysis is
Kaur Harpreet, Rani Jyoti
doaj +1 more source
Forensic analysis of video steganography tools [PDF]
Steganography is the art and science of concealing information in such a way that only the sender and intended recipient of a message should be aware of its presence.
Thomas Sloan, Julio Hernandez-Castro
doaj +2 more sources
Convolutional Neural Network Steganalysis's Application to Steganography
This paper presents a novel approach to increase the performance bounds of image steganography under the criteria of minimizing distortion. The proposed approach utilizes a steganalysis convolutional neural network (CNN) framework to understand an image ...
Agarwal, Chirag +3 more
core +1 more source
Steganography in beautified mages
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images.
Liyun Liu +4 more
openaire +3 more sources
Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text.
Manjunath, Naidele Katrumane
core +1 more source
Principles and Perspectives of Steganography in Error Correction Codes
The main preference of a steganography in ECC with other types of steganography are listed. Opportunity and relevance of strict mathematical researches for this type of steganography are explained. The goals of a steganography in ECC are listed.
Pavel Vladimirovich Slipenchuk
doaj
A Secure Video Steganography Based on the Intra-Prediction Mode (IPM) for H264
Recently, many video steganography algorithms based on the intra-prediction mode (IPM) have been adaptive steganography algorithms. These algorithms usually focus on the research about mapping rules and distortion functions while ignoring the fact that ...
Mingyuan Cao, Lihua Tian, Chen Li
doaj +1 more source

