4.8 Article

Robust coverless steganography using limited mapping images

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Multidisciplinary

Novel Coverless Steganography Method Based on Image Selection and StarGAN

Xianyi Chen et al.

Summary: This study proposes a new method of Cover Less Image Steganography (CIS) based on image selection and Star Generative Adversarial Network (StarGAN). The method aims to increase the hidden capacity, maintain better image quality, and enhance robustness and security performance.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

An encrypted coverless information hiding method based on generative models

Qi Li et al.

Summary: The paper introduces an encrypted coverless information hiding method that transfers secret images between different image domains using generative models, addressing the issue of traditional image steganography methods leaving traces in cover images. Experimental results show that the method is able to generate high-quality encrypted images with strong security and reconstruction ability.

INFORMATION SCIENCES (2021)

Article Optics

Optical color image encryption based on fingerprint key and phase-shifting digital holography

Yonggang Su et al.

Summary: An optical color image encryption scheme based on fingerprint key and three-step phase-shifting digital holography is proposed in this paper, which encrypts the primary color image hidden in a greyscale carrier image into three noise-like holograms with the help of fingerprint-based random phase masks and three-step phase-shifting digital holography. The security of the proposed encryption scheme is greatly enhanced by using the fingerprint key shared by the sender and authorized receiver, which is strongly linked with the user and need not be transmitted via the networks.

OPTICS AND LASERS IN ENGINEERING (2021)

Article Engineering, Electrical & Electronic

Coverless Image Steganography Based on Multi-Object Recognition

Yuanjing Luo et al.

Summary: The proposed method utilizes multi-object recognition to generate robust binary sequences, introduces a novel mapping rule, effectively resists geometric attacks and noise attacks, with images remaining unmodified during transmission, demonstrating strong robustness.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2021)

Article Computer Science, Artificial Intelligence

Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping

Qiang Liu et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Article Mathematics, Interdisciplinary Applications

A Coverless Image Information Hiding Algorithm Based on Fractal Theory

Xiang Zhang et al.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2020)

Article Engineering, Electrical & Electronic

Coverless information hiding based on the generation of anime characters

Yi Cao et al.

EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING (2020)

Article Computer Science, Information Systems

A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image

Lina Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A novel coverless information hiding method based on the average pixel value of the sub-images

Liming Zou et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research

Inas Jawad Kadhim et al.

NEUROCOMPUTING (2019)

Article Computer Science, Information Systems

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

Zhili Zhou et al.

IEEE ACCESS (2019)

Article Computer Science, Hardware & Architecture

A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information

Sahar A. El Rahman

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Computer Science, Information Systems

Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

Xiang Zhang et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Engineering, Electrical & Electronic

Constructive Steganography Using Texture Synthesis

Zhenxing Qian et al.

IETE TECHNICAL REVIEW (2018)

Article Computer Science, Information Systems

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

Donghui Hu et al.

IEEE ACCESS (2018)

Article Engineering, Electrical & Electronic

A Coverless Information Hiding Algorithm Based on Grayscale Gradient Co-occurrence Matrix

Jianbin Wu et al.

IETE TECHNICAL REVIEW (2018)

Article Computer Science, Information Systems

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain

Samer Atawneh et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Universal distortion function for steganography in an arbitrary domain

Vojtech Holub et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2014)

Article Computer Science, Theory & Methods

SVD-Based Universal Spatial Domain Image Steganalysis

Gokhan Gul et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)