-
61
A deep learning-driven multi-layered steganographic approach for enhanced data security
Published 2025-02-01Subjects: Get full text
Article -
62
Online universal steganalysis system based on multiple pre-trained model
Published 2017-05-01Subjects: “…digital image steganography…”
Get full text
Article -
63
-
64
Generative blockchain-based covert communication model based on Markov chain
Published 2022-10-01Subjects: Get full text
Article -
65
A STEGENOGRAPHY IN 3D MESH BY REARRANGING THE ORDER OF VERTEX PRESENTATION
Published 2013-06-01Subjects: Get full text
Article -
66
Cryptographic secrecy of steganographic matrix encoding
Published 2012-06-01Subjects: Get full text
Article -
67
Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment
Published 2025-01-01Subjects: Get full text
Article -
68
Subtractive pixel adjacency matrix based features for steganalysis of spatial color images
Published 2016-02-01Subjects: Get full text
Article -
69
Model of Reconfigurable Steganographic System Using Blockchain Technology
Published 2019-11-01Subjects: Get full text
Article -
70
Film and Television Animation Sensing and Visual Image by Computer Digital Image Technology
Published 2022-01-01“…The established image enhancement algorithm can significantly improve the security of the existing spatial image steganography algorithm under different embedding rates, especially at a high embedding rate; the improvement of the spatial domain steganography algorithm is greater. …”
Get full text
Article -
71
RETRACTED: Parallel Encryption With Digit Arithmetic Of Covertext Model Using Duplicated Covertext
Published 2022-12-01“…Steganography is the art and science of writing hidden messages or hiding messages in such a way that, apart from the sender and the recipient, no one knows or is aware that there is a secret message (it does not appear that there is a hidden message. …”
Get full text
Article -
72
Analisis Pengaruh Citra Terhadap Kombinasi Kriptografi RSA dan STEGANOGRAFi LSB
Published 2022-02-01“…Cryptography and steganography have similarities in terms of security. …”
Get full text
Article -
73
An Image Sharing Encryption Management System For Kabale University.
Published 2024“…Myriad methods of protection are used ranging from a simple authentication password to most complex cryptography or Steganography algorithms for hiding the extremely sensitive data. …”
Get full text
Thesis -
74
Pengamanan Citra Berwarna Menggunakan Kriptografi Visual Skema Meaningful Shares dan Steganografi LSB
Published 2022-12-01“…To add security, we need Steganography LSB, we can insert the image shares again into the new cover so that the quality and security will increase. …”
Get full text
Article -
75
Steganographer identification of JPEG image based on feature selection and graph convolutional representation
Published 2023-07-01“…Aiming at the problem that the feature dimension of JPEG image steganalysis is too high, which leads to the complexity of distance calculation between users and a decrease in the identification performance of the steganographer, a method for steganographer recognition based on feature selection and graph convolutional representation was proposed.Firstly, the steganalysis features of the user’s images were extracted, and the feature subset with highseparability was selected.Then, the users were represented as a graph, and the features of users were obtained by training the graph convolutional neural network.Finally, because inter-class separability and intra-class aggregation were considered, the features of users that could capture the differences between users were learned.For steganographers who use JPEG steganography, such as nsF5, UED, J-UNIWARD, and so on, to embed secret information in images, the proposed method can reduce the feature dimensions and computing.The identification accuracy of various payloads can reach more than 80.4%, and it has an obvious advantage at the low payload.…”
Get full text
Article -
76
Reversible Data Hiding Using Two Marked Images Based on Adaptive Coefficient-Shifting Algorithm
Published 2012-01-01“…Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.…”
Get full text
Article -
77
Integration of a Quantum Voting Scheme into Grayscale Images Using the Novel Enhanced Quantum Representation and Qiskit Framework
Published 2022-01-01“…This paper illustrates the way a proposed quantum voting scheme can be designed in combination with a steganography technique called Least Significant Bit (LSB), by modifying a small number of pixels in multiple grayscale images. …”
Get full text
Article -
78
Stego on FPGA: An IWT Approach
Published 2014-01-01“…A reconfigurable hardware architecture for the implementation of integer wavelet transform (IWT) based adaptive random image steganography algorithm is proposed. The Haar-IWT was used to separate the subbands namely, LL, LH, HL, and HH, from 8×8 pixel blocks and the encrypted secret data is hidden in the LH, HL, and HH blocks using Moore and Hilbert space filling curve (SFC) scan patterns. …”
Get full text
Article -
79
A video steganalysis method based on coding cost variation
Published 2021-02-01“…Experiments show that Motion Vector Coding Cost Change features have higher detection accuracy than Add-or-Subtract-One, Improved Motion Vector Reversion-Based, and other typical features in various steganography methods, and Subtractive Probability of Coding Cost Optimal Matching features have higher detection effect and better robustness than Subtractive Probability of Optimal Matching features.…”
Get full text
Article -
80
DDAC: a feature extraction method for model of image steganalysis based on convolutional neural network
Published 2022-05-01“…To solve the problem that for image steganalysis based on convolution neural network, manual designed filter kernels were used to extract residual characteristics, but in practice, these kernels filter were not suitable for each steganography algorithm and have worse performance in application, a directional difference adaptive combination (DDAC) method was proposed.Firstly, the difference was calculated between center pixel and each directional pixel around, and 1 × 1 convolution was adopted to achieve linear combinations of directional difference.Since the combination parameters self-adaptively update according to loss function, filter kernels could be more effective in extracting diverse residual characteristics of embedding information.Secondly, truncated linear unit (TLU) was applied to raise the ratio of embedding information residual to image information residual.The model’s coveragence was accelerated and the ability of feature extraction was promoted.Experimental results indicate that substituting the proposed method could improve the accuracy of Ye-net and Yedroudj-net by 1.30%~8.21% in WOW and S-UNIWARD datasets.Compared with fix and adjustable SRM filter kernels methods, the accuracy of test model using DDAC increases 0.60%~20.72% in various datasets, and the training progress was more stable.DDAC-net was proved to be more effective in comparsion with other steganalysis model.…”
Get full text
Article