Search
Search Results
-
Enhanced CNN-DCT Steganography: Deep Learning-Based Image Steganography Over Cloud
Image steganography plays a pivotal role in secure data communication and confidentiality protection, particularly in cloud-based environments. In...
-
Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography
This study investigates the innovative application of Direct Sequence Spread Spectrum (DSSS) technology in the realm of image steganography, known as...
-
Enhancing image steganography security via universal adversarial perturbations
Image steganography refers to embedding secret information into a cover image without drawing perceptible distortions. Nevertheless, steganalyzers...
-
Audio steganography cover enhancement via reinforcement learning
Recent advancements in steganography analysis based on deep neural networks have led to the development of steganography schemes that incorporate...
-
StegaEdge: learning edge-guidance steganography
Steganography is critical in traceability, authentication, and secret delivery for multimedia. In this paper, we propose a novel image steganography...
-
DISH: Digital image steganography using stochastic-computing with high-capacity
Stochastic computing is a relatively new approach to computing that has gained interest in recent years due to its potential for low-power and...
-
Video steganography: recent advances and challenges
Video steganography approach enables hiding chunks of secret information inside video sequences. The features of video sequences including high...
-
SPM: estimating payload locations of QIM-based steganography in low-bit-rate compressed speeches
Steganography, adopted to hide secret information into multiple digital carriers, has been widely used by lawbreakers for spiteful purposes, posing a...
-
Revisiting the steganography techniques with a novel region-based separation approach
Cryptography and steganography are employed to secure digital data transfers. We introduced an efficient region-based steganography pipeline to...
-
EDGE-Based Image Steganography
Steganography is a technique of hiding information in another data. In image steganography, the secret message is embedded inside one digital image.... -
StegVRN: Enhancing Quality of Video Steganography Using CNN-Based Object Selection
The dynamic nature of video content facilitates steganographic processes, and recent advancements in Deep Learning, particularly Convolutional Neural...
-
An Improved Intensity Factor of Correlation-Based Steganography Using M-Sequence and DCT
It is important to securely send information through the Internet; thus, technologies for safely exchanging information are required. One such...
-
A deep learning-based steganography method for high dynamic range images
High dynamic range (HDR) images have recently drawn much attention in multimedia community. In this paper, we proposed an HDR image steganography...
-
Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement
Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the...
-
Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission
The proliferation of data sharing over the Internet has given rise to pressing concerns surrounding data security. Addressing these concerns,...
-
Enhancing the anti-steganalysis ability of steganography via adversarial examples
Steganography technology can effectively conceal secret information in the carrier medium, enable covert communication without drawing the attention...
-
An adaptive approach for multi-media steganography using improved chaotic map and discrete cosine transform
Steganography is the process of hiding secret data within the image, audio or the text files. Video steganography is a technique where the secret...
-
Unveiling vulnerabilities: evading YOLOv5 object detection through adversarial perturbations and steganography
In the realm of machine learning, a discernible surge in research has been observed, focusing on the development of adversarial perturbations with...
-
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
In today's interconnected world, safeguarding digital data's confidentiality and security is crucial. Cryptography and steganography are two primary...
-
Dynamic 8-bit XOR algorithm with AES crypto algorithm for image steganography
The proliferation of the Internet’s infrastructure, extending even to rural areas, has propelled images to the forefront of multimedia content,...