We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,016 results
  1. Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud

    Image steganography plays a pivotal role in secure data communication and confidentiality protection, particularly in cloud-based environments. In...

    Shahnawaz Ahmad, Justin Onyarin Ogala, ... Shabana Mehfuz in SN Computer Science
    Article 06 April 2024
  2. Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography

    This study investigates the innovative application of Direct Sequence Spread Spectrum (DSSS) technology in the realm of image steganography, known as...

    Oleksandr Kuznetsov, Emanuele Frontoni, Kyrylo Chernov in Applied Intelligence
    Article 17 April 2024
  3. Enhancing image steganography security via universal adversarial perturbations

    Image steganography refers to embedding secret information into a cover image without drawing perceptible distortions. Nevertheless, steganalyzers...

    Lan Liu, **n Liu, ... Gaobo Yang in Multimedia Tools and Applications
    Article 12 April 2024
  4. Audio steganography cover enhancement via reinforcement learning

    Recent advancements in steganography analysis based on deep neural networks have led to the development of steganography schemes that incorporate...

    Peiwen Zhuo, Diqun Yan, ... Li Dong in Signal, Image and Video Processing
    Article 25 October 2023
  5. StegaEdge: learning edge-guidance steganography

    Steganography is critical in traceability, authentication, and secret delivery for multimedia. In this paper, we propose a novel image steganography...

    Kun Hu, Zhaoyangfan Huang, ... **ngjun Wang in The Visual Computer
    Article 22 July 2023
  6. DISH: Digital image steganography using stochastic-computing with high-capacity

    Stochastic computing is a relatively new approach to computing that has gained interest in recent years due to its potential for low-power and...

    Mohamed EL-Hady, Maha H. Abbas, ... Ahmed G. Radwan in Multimedia Tools and Applications
    Article Open access 20 January 2024
  7. Video steganography: recent advances and challenges

    Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high...

    Jayakanth Kunhoth, Nandhini Subramanian, ... Ahmed Bouridane in Multimedia Tools and Applications
    Article Open access 04 April 2023
  8. SPM: estimating payload locations of QIM-based steganography in low-bit-rate compressed speeches

    Steganography, adopted to hide secret information into multiple digital carriers, has been widely used by lawbreakers for spiteful purposes, posing a...

    Cheng Zhang, Shujuan Jiang, Zhong Chen in Multimedia Tools and Applications
    Article 07 June 2024
  9. Revisiting the steganography techniques with a novel region-based separation approach

    Cryptography and steganography are employed to secure digital data transfers. We introduced an efficient region-based steganography pipeline to...

    Romiyal George, Lojenaa Navanesan, Kartheeswaran Thangathurai in Multimedia Tools and Applications
    Article 06 February 2024
  10. EDGE-Based Image Steganography

    Steganography is a technique of hiding information in another data. In image steganography, the secret message is embedded inside one digital image....
    Conference paper 2024
  11. StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection

    The dynamic nature of video content facilitates steganographic processes, and recent advancements in Deep Learning, particularly Convolutional Neural...

    R. B. Sushma, G. R. Manjula in SN Computer Science
    Article 20 January 2024
  12. An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT

    It is important to securely send information through the Internet; thus, technologies for safely exchanging information are required. One such...

    Kaito Onuma, Sumiko Miyata in SN Computer Science
    Article 15 November 2023
  13. A deep learning-based steganography method for high dynamic range images

    High dynamic range (HDR) images have recently drawn much attention in multimedia community. In this paper, we proposed an HDR image steganography...

    Yongqing Huo, Yan Qiao, Yaohui Liu in The Visual Computer
    Article 06 February 2024
  14. Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement

    Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the...

    Fengyong Li, Longwei Li, ... Chuan Qin in Multimedia Tools and Applications
    Article 10 April 2024
  15. Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission

    The proliferation of data sharing over the Internet has given rise to pressing concerns surrounding data security. Addressing these concerns,...

    Samira Rezaei, Amir Javadpour in Multimedia Tools and Applications
    Article Open access 13 March 2024
  16. Enhancing the anti-steganalysis ability of steganography via adversarial examples

    Steganography technology can effectively conceal secret information in the carrier medium, enable covert communication without drawing the attention...

    Ye Peng, GuoBin Fu, ... ChaoFan Duan in Multimedia Tools and Applications
    Article 17 May 2023
  17. An adaptive approach for multi-media steganography using improved chaotic map and discrete cosine transform

    Steganography is the process of hiding secret data within the image, audio or the text files. Video steganography is a technique where the secret...

    Shyla Nagarajegowda, Kalimuthu Krishnan in Signal, Image and Video Processing
    Article 21 June 2024
  18. Unveiling vulnerabilities: evading YOLOv5 object detection through adversarial perturbations and steganography

    In the realm of machine learning, a discernible surge in research has been observed, focusing on the development of adversarial perturbations with...

    Gauri Sharma, Urvashi Garg in Multimedia Tools and Applications
    Article 15 February 2024
  19. Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

    In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...

    Indy Haverkamp, Dipti K. Sarmah in International Journal of Information Security
    Article Open access 05 May 2024
  20. Dynamic 8-bit XOR algorithm with AES crypto algorithm for image steganography

    The proliferation of the Internet’s infrastructure, extending even to rural areas, has propelled images to the forefront of multimedia content,...

    D. Madhu, S. Vasuhi, A. Samydurai in Signal, Image and Video Processing
    Article 25 April 2024
Did you find what you were looking for? Share feedback.