4.8 Article

Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

An Automatic Cost Learning Framework for Image Steganography Using Deep Reinforcement Learning

Weixuan Tang et al.

Summary: The article introduces a new embedding cost learning framework called SPAR-RL, which overcomes limitations of traditional methods and achieves more efficient and secure information embedding through reinforcement learning.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

VAE-Stega: Linguistic Steganography Based on Variational Auto-Encoder

Zhong-Liang Yang et al.

Summary: In recent years, linguistic steganography based on text auto-generation technology has developed significantly, but the quality of generated steganographic text cannot fully ensure steganographic security. This paper proposes a new linguistic steganography based on VAE, which can greatly improve the imperceptibility of generated steganographic sentences according to experimental results.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Electrical & Electronic

T-Safe: Trustworthy Service Provisioning for IoT-Based Intelligent Transport Systems

Prajnamaya Dass et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Engineering, Electrical & Electronic

Coverless information hiding based on the generation of anime characters

Yi Cao et al.

EURASIP JOURNAL ON IMAGE AND VIDEO PROCESSING (2020)

Article Computer Science, Theory & Methods

An Embedding Cost Learning Framework Using GAN

Jianhua Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Artificial Intelligence

Coverless image steganography using partial-duplicate image retrieval

Zhili Zhou et al.

SOFT COMPUTING (2019)

Article Computer Science, Theory & Methods

RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks

Zhong-Liang Yang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

A novel coverless information hiding method based on the average pixel value of the sub-images

Liming Zou et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2019)

Article Computer Science, Artificial Intelligence

Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images

Sheng Li et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2019)

Article Computer Science, Information Systems

Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

Xiang Zhang et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Computer Science, Information Systems

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

Donghui Hu et al.

IEEE ACCESS (2018)

Article Computer Science, Interdisciplinary Applications

Industrial IoT in 5G environment towards smart manufacturing

Jiangfeng Cheng et al.

JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION (2018)

Article Computer Science, Theory & Methods

Smart City and IoT

Tai-hoon Kim et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Engineering, Electrical & Electronic

Structural Design of Convolutional Neural Networks for Steganalysis

Guanshuo Xu et al.

IEEE SIGNAL PROCESSING LETTERS (2016)

Article Computer Science, Theory & Methods

Content-Adaptive Steganography by Minimizing Statistical Detectability

Vahid Sedighi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

Coverless Multi-keywords Information Hiding Method Based on Text

Zhili Zhou et al.

INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2016)

Article Computer Science, Information Systems

Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications

Ala Al-Fuqaha et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2015)

Article Computer Science, Artificial Intelligence

Steganography Using Reversible Texture Synthesis

Kuo-Chen Wu et al.

IEEE TRANSACTIONS ON IMAGE PROCESSING (2015)

Article Computer Science, Information Systems

Universal distortion function for steganography in an arbitrary domain

Vojtech Holub et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2014)

Article Computer Science, Theory & Methods

Rich Models for Steganalysis of Digital Images

Jessica Fridrich et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes

Tomas Filler et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2011)

Article Computer Science, Hardware & Architecture

The Internet of Things: A survey

Luigi Atzori et al.

COMPUTER NETWORKS (2010)

Article Engineering, Electrical & Electronic

LSB matching revisited

J Mielikainen

IEEE SIGNAL PROCESSING LETTERS (2006)

Article Computer Science, Artificial Intelligence

Hiding data in images by simple LSB substitution

CK Chan et al.

PATTERN RECOGNITION (2004)