-
21
Adaptive JPEG steganography based on distortion cost updating
Published 2017-09-01Subjects: Get full text
Article -
22
-
23
Coverless Steganography for Face Recognition Based on Diffusion Model
Published 2024-01-01Subjects: Get full text
Article -
24
-
25
A COMPUTATIONAL SYSTEM FOR EVALUATING HUMAN PERCEPTION IN VIDEO STEGANOGRAPHY
Published 2024-12-01Subjects: “…steganography…”
Get full text
Article -
26
A Formula Adaptive Pixel Pair Matching Steganography Algorithm
Published 2018-01-01“…Pixel pair matching (PPM) is widely used in digital image steganography. As an important derivation, adaptive pixel pair matching method (APPM) offers low distortion and allows embedded digits in any notational system. …”
Get full text
Article -
27
DGANS:robustness image steganography model based on double GAN
Published 2020-01-01Subjects: “…image steganography…”
Get full text
Article -
28
A robust audio steganography algorithm based on differential evolution
Published 2021-11-01Subjects: “…audio steganography…”
Get full text
Article -
29
Design of steganography algorithm based on MPEG-4 coding scheme
Published 2009-01-01Get full text
Article -
30
Adaptive steganography algorithm in digital image based on Arnold transform
Published 2016-06-01Subjects: “…steganography…”
Get full text
Article -
31
Image steganography based on nonsubsampled Contourlet transform and Hill cipher
Published 2016-06-01“…A novel image steganography was proposed,which was based on nonsubsampled Contourlet transform (NSCT)and Hill cipher.Firstly,cover image was decomposed with NSCT.It provided a multi-scale and multi-directional representation of an image.One of subbands was selected to embed secret data.Then Hill cipher was applied to encrypt the secret message.How to find a proper cipher matrix was important in this way.The selected matrix should be inevitable and relatively prime to the number of alphabets.The skill of 2<sup>k</sup> correction was applied to ease the difference between cover and stego image.Experiment results show that both stego image and retrieved image have better image quality with the proposed approach than other methods.…”
Get full text
Article -
32
Anti-packet-loss joint encoding for voice-over-IP steganography
Published 2016-11-01Subjects: “…VoIP steganography…”
Get full text
Article -
33
An Enhanced Steganographic Code and its Application in Voice-Over-IP Steganography
Published 2019-01-01Subjects: Get full text
Article -
34
A New Information Hiding Method Based on Improved BPCS Steganography
Published 2015-01-01Get full text
Article -
35
Generative text steganography method based on emotional expression in semantic space
Published 2023-04-01Subjects: “…generative text steganography…”
Get full text
Article -
36
High-capacity image steganography algorithm combining image encryption and deep learning
Published 2021-09-01Subjects: Get full text
Article -
37
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Published 2015-01-01“…Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), and R value (random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. …”
Get full text
Article -
38
A Novel Steganography Technique for SDTV-H.264/AVC Encoded Video
Published 2016-01-01“…This exemplifies that steganography is affordable in digital television.…”
Get full text
Article -
39
Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity
Published 2024-01-01“…Pressing challenges in the context of a steganography system include security, imperceptibility, and capacity issues. …”
Get full text
Article -
40
Text steganography method based on automatic selection coding and dynamic word selection strategy
Published 2022-09-01Subjects: Get full text
Article