4.6 Article

Deep Image Steganography Using Transformer and Recursive Permutation

Related references

Note: Only part of the references are listed.
Article Engineering, Aerospace

A Survey on the Applications of Convolutional Neural Networks for Synthetic Aperture Radar: Recent Advances

Amir Hosein Oveis et al.

Summary: This study systematically reviews the application of convolutional neural networks (CNNs) in the analysis of synthetic aperture radar (SAR) data. Various subareas of SAR data analysis, including automatic target recognition, land use and land cover classification, segmentation, change detection, object detection, and image denoising, are discussed. Practical techniques such as data augmentation and transfer learning are emphasized, along with the introduction of complex-valued CNNs that exploit phase information in SAR complex images. The review paper concludes by highlighting open challenges and future research directions.

IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE (2022)

Article Computer Science, Artificial Intelligence

Pyramid particle swarm optimization with novel strategies of competition and cooperation

Taiyong Li et al.

Summary: This paper proposes a novel particle swarm optimization algorithm called PPSO, which utilizes a pyramid structure and competitive-cooperative strategies to update particle information. Extensive experiments demonstrate that PPSO outperforms other algorithms in terms of accuracy and convergence speed, indicating its potential in numerical optimization.

APPLIED SOFT COMPUTING (2022)

Article Engineering, Biomedical

IoT-based ECG monitoring for arrhythmia classification using Coyote Grey Wolf optimization-based deep learning CNN classifier

Abhishek Kumar et al.

Summary: This study proposes an automatic detection and classification method for arrhythmia using an optimized deep learning classifier. By collecting ECG signals using IoT nodes and establishing feature vectors through Coy-GWO-based Deep CNN classifier, anomalies in the ECG signal can be detected, achieving a classification accuracy of 95%.

BIOMEDICAL SIGNAL PROCESSING AND CONTROL (2022)

Article Environmental Studies

Multi-perspective crude oil price forecasting with a new decomposition-ensemble framework

Jingjun Guo et al.

Summary: The study proposes a new multi-perspective crude oil price forecasting model, which utilizes variational mode decomposition and fuzzy entropy to select effective predictors and ultimately obtain accurate forecasting values through integrated prediction results.

RESOURCES POLICY (2022)

Article Computer Science, Information Systems

An adaptive reversible watermarking in IWT domain

Lingzhuang Meng et al.

Summary: This paper proposed an adaptive reversible watermarking method in the IWT domain, which enables blind extraction and lossless results. By embedding watermark based on the relationship between adjacent elements, it achieves better extraction performance compared to similar algorithms, suitable for medical image transmission and forensic document verification.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

Forecasting crude oil prices based on variational mode decomposition and random sparse Bayesian learning

Taiyong Li et al.

Summary: The paper introduces a novel approach VMD-RSBL that combines VMD and RSBL for forecasting crude oil prices. By decomposing the crude oil price series into components and predicting each component individually using predictors built on random samples and random lags, the final forecasted prices are obtained by aggregating the predictions of all components. Extensive experiments show that VMD-RSBL outperforms many state-of-the-art schemes in terms of several evaluation indicators.

APPLIED SOFT COMPUTING (2021)

Article Engineering, Electrical & Electronic

Color image encryption based on joint permutation and diffusion

Taiyong Li et al.

Summary: A joint permutation and diffusion method for color image encryption is proposed, utilizing a 4D hyperchaotic system to generate sequences and introducing plain image information for enhanced security. Experimental results show its capability to resist various attack types.

JOURNAL OF ELECTRONIC IMAGING (2021)

Article Physics, Multidisciplinary

Hyper-Chaotic Color Image Encryption Based on Transformed Zigzag Diffusion and RNA Operation

Duzhong Zhang et al.

Summary: The paper introduces a novel image encryption method based on a six-dimensional hyper-chaotic encryption scheme, utilizing three-dimensional transformed Zigzag diffusion and RNA operation, showing high resistance against known attacks and superior performance in protecting digital visual information.

ENTROPY (2021)

Article Physics, Multidisciplinary

Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion

Taiyong Li et al.

Summary: This paper proposes a novel hyperchaotic image encryption scheme MBPD, which enhances image security through multiple bit permutation and diffusion. Extensive experiments show that MBPD can effectively resist different types of attacks and outperforms other popular encryption methods.

ENTROPY (2021)

Article Computer Science, Information Systems

Neural Reversible Steganography with Long Short-Term Memory

Ching-Chun Chang

Summary: Deep learning has revolutionized digital steganography, but its integration into reversible steganography lacks consensus due to concerns over transparency and interpretability of neural networks. Instead of using neural networks in encoding, they are applied to an analytics module to maximize steganographic capacity.

SECURITY AND COMMUNICATION NETWORKS (2021)

Article Computer Science, Information Systems

Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEP

Aditya Kumar Sahu et al.

Summary: This paper proposes a technique based on multi-directional pixel value differencing and modulus function to address falling-off boundary and incorrect extraction problems in pixel value differencing image steganography. Experimental results show that PSNR is optimal for vertical pairs and EC is optimal for diagonal pairs. Additionally, the proposed technique exhibits exceptional resistance to various steganalysis attacks.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Article Computer Science, Artificial Intelligence

A data hiding scheme based on U-Net and wavelet transform

Lianshan Liu et al.

Summary: The study introduces a data hiding scheme based on U-Net and wavelet transform, which achieves data hiding and extraction through jointly trained hidden and extraction networks. Experimental results demonstrate better data invisibility and more accurate data extraction compared to traditional schemes.

KNOWLEDGE-BASED SYSTEMS (2021)

Proceedings Paper Computer Science, Information Systems

A Novel Grayscale Image Steganography via Generative Adversarial Network

Zhihua Gan et al.

Summary: The paper introduces a novel grayscale image steganography method via generative adversarial network, enhancing invisibility and security through encoding network construction and adversarial training, with experimental results showing superiority in quality, invisibility, and security compared to existing models.

WEB INFORMATION SYSTEMS AND APPLICATIONS (WISA 2021) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Joint compressive autoencoders for full-image-to-image hiding

Xiyao Liu et al.

Summary: The paper introduces a novel Joint Compressive Autoencoder (J-CAE) framework that can increase the hidden image capacity and reduce reconstruction errors, addressing the trade-off issue in previous deep learning methods. Experimental results demonstrate that the proposed method outperforms state-of-the-art techniques in imperceptibility and recovery quality of hidden images.

2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR) (2021)

Review Computer Science, Information Systems

Image Steganography: A Review of the Recent Advances

Nandhini Subramanian et al.

Summary: This paper introduces the concept of image steganography and the application of deep learning in this field, summarizing different types of deep learning methods and related datasets, experimental setups, and evaluation metrics. It aims to help researchers understand the current trends and challenges by providing information summaries and future directions.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A new reversible data hiding in transform domain

Zahra Pakdaman et al.

Summary: This paper proposes a new reversible watermarking scheme, utilizing Reversible Walsh-Hadamard Transform for image processing and performing Singular Value Decomposition on the transformed image for watermark embedding. Quick Response (QR) code is embedded using a prediction-based method for full recovery.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Theory & Methods

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning

Weixuan Tang et al.

Summary: The article introduces a new embedding cost learning framework called SPAR-RL, which overcomes limitations of traditional methods and achieves more efficient and secure information embedding through reinforcement learning.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

A Siamese CNN for Image Steganalysis

Weike You et al.

Summary: This paper explores the use of convolutional neural networks for image steganalysis and proposes an end-to-end deep learning solution for distinguishing steganography images from normal images without retraining parameters. The proposed network demonstrates satisfactory performance in classifying images of different sizes using shared parameters and a Siamese CNN architecture.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Review Computer Science, Artificial Intelligence

Digital watermarking techniques for image security: a review

A. Mohanarathinam et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2020)

Article Chemistry, Analytical

High-Capacity Image Steganography Based on Improved Xception

Xintao Duan et al.

SENSORS (2020)

Article Computer Science, Information Systems

High-Capacity Image Steganography Based on Improved FC-DenseNet

Xintao Duan et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Selective medical image encryption using DNA cryptography

Prema T. Akkasaligar et al.

INFORMATION SECURITY JOURNAL (2020)

Article Computer Science, Information Systems

Invisible steganography via generative adversarial networks

Ru Zhang et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Review Computer Science, Information Systems

Deep Learning Applied to Steganalysis of Digital Images: A Systematic Review

Tabares-Soto Reinel et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Analysis and Improvement of Steganography Protocol Based on Bell States in Noise Environment

Zhiguo Qu et al.

CMC-COMPUTERS MATERIALS & CONTINUA (2019)

Article Computer Science, Information Systems

Reversible Image Steganography Scheme Based on a U-Net Structure

Xintao Duan et al.

IEEE ACCESS (2019)

Article Engineering, Electrical & Electronic

2D Logistic-Sine-coupling map for image encryption

Zhongyun Hua et al.

SIGNAL PROCESSING (2018)

Article Engineering, Electrical & Electronic

Automatic Steganographic Distortion Learning Using a Generative Adversarial Network

Weixuan Tang et al.

IEEE SIGNAL PROCESSING LETTERS (2017)

Article Computer Science, Information Systems

Reversible data hiding with contrast enhancement and tamper localization for medical images

Guangyong Gao et al.

INFORMATION SCIENCES (2017)

Article Mathematics, Interdisciplinary Applications

A Novel Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System and DNA Computing

Taiyong Li et al.

COMPLEXITY (2017)

Article Physics, Multidisciplinary

ECG Classification Using Wavelet Packet Entropy and Random Forests

Taiyong Li et al.

ENTROPY (2016)

Review Computer Science, Artificial Intelligence

Deep learning in neural networks: An overview

Juergen Schmidhuber

NEURAL NETWORKS (2015)

Article Computer Science, Artificial Intelligence

Gradient Magnitude Similarity Deviation: A Highly Efficient Perceptual Image Quality Index

Wufeng Xue et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2014)

Article Computer Science, Artificial Intelligence

FSIM: A Feature Similarity Index for Image Quality Assessment

Lin Zhang et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2011)

Review Engineering, Electrical & Electronic

Digital image steganography: Survey and analysis of current methods

Abbas Cheddad et al.

SIGNAL PROCESSING (2010)

Article Computer Science, Artificial Intelligence

Image quality assessment: From error visibility to structural similarity

Z Wang et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2004)