4.5 Article

A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A High-Capacity Coverless Information Hiding Based on the Lowest and Highest Image Fragments

Kurnia Anggriani et al.

Summary: Coverless data hiding is a resistant method against steganalytical tool attacks because it does not alter the stego image. However, it has a limited hiding capacity. Recently, a coverless information-hiding method based on the most significant bit of the cover image (CIHMSB) has been developed, which is resistant to various attack threats but still has a limited hiding capacity. This paper proposes a coverless information-hiding method based on the lowest and highest values of the fragment (CIHLHF), which has a hiding capacity twice that of CIHMSB according to experimental results.

ELECTRONICS (2023)

Article Engineering, Multidisciplinary

Novel Coverless Steganography Method Based on Image Selection and StarGAN

Xianyi Chen et al.

Summary: This study proposes a new method of Cover Less Image Steganography (CIS) based on image selection and Star Generative Adversarial Network (StarGAN). The method aims to increase the hidden capacity, maintain better image quality, and enhance robustness and security performance.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Information Systems

Robust coverless steganography using limited mapping images

Xiyao Liu et al.

Summary: This paper proposes a novel robust coverless steganography using limited mapping images to address the challenges of incomplete mapping, robustness, and distinguishability. By extracting ring statistics and using a chaotic system to scramble image features for mapping secret information, the proposed scheme reduces the demand for mapping images and enhances information security.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Engineering, Electrical & Electronic

A Novel Video Steganographic Scheme Incorporating the Consistency Degree of Motion Vectors

Ying Liu et al.

Summary: In this study, a novel steganographic scheme in the motion vector domain for H.264 video is proposed. The scheme improves the security performance against the newly emerged multi-domain feature set MVC, while maintaining good coding efficiency.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Engineering, Electrical & Electronic

A Robust Coverless Steganography Scheme Using Camouflage Image

Qiang Liu et al.

Summary: This paper proposes a robust coverless steganography scheme using camouflage image (CI-CIS), which introduces a camouflage image as the transmission carrier and establishes the correlation between them using Convolutional Neural Network (CNN) features. By designing a reversible retrieval scheme through image clustering, the camouflage image can retrieve the corresponding stego-image to recover the secret information. Experimental results show that CI-CIS has higher robustness and more flexible capacity setting compared to existing CIS methods.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Computer Science, Information Systems

Coverless Information Hiding Based on Probability Graph Learning for Secure Communication in IoT Environment

Zhili Zhou et al.

Summary: This paper proposes a coverless information hiding scheme based on probability graph learning for secure communication in the IoT environment. By concealing secret information in a generated sequence of IoT data, it not only enhances hiding capacity but also improves security without affecting communication efficiency.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Engineering, Electrical & Electronic

A Robust Coverless Steganography Based on Generative Adversarial Networks and Gradient Descent Approximation

Fei Peng et al.

Summary: This paper proposes a novel image steganography framework based on the generator of GAN and gradient descent approximation to address the irreversibility problem in some common neural networks for secret data extraction. Experimental results show that the proposed method achieves good performance in extraction accuracy, capacity, and robustness, and it also demonstrates good generalization with different GAN models and image datasets.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2022)

Article Computer Science, Theory & Methods

Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector

Remi Cogranne et al.

Summary: This paper presents a statistical model-based steganography method for JPEG images, which achieves security by minimizing statistical performance. Experimental results show that the proposed method outperforms deep learning-based steganalysis methods.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2022)

Article Computer Science, Information Systems

Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography-An Innovative Approach

Mahmoud M. Mahmoud et al.

Summary: We propose a novel LSB-BMSE method for enhancing LSB audio steganography by using an innovative mechanism, BMSE, to embed a secret message after hiding its size in random samples. Experimental results demonstrate that LSB-BMSE significantly surpasses existing methods in terms of hiding capacity and imperceptibility.

IEEE ACCESS (2022)

Article Engineering, Electrical & Electronic

Coverless Image Steganography Based on Multi-Object Recognition

Yuanjing Luo et al.

Summary: The proposed method utilizes multi-object recognition to generate robust binary sequences, introduces a novel mapping rule, effectively resists geometric attacks and noise attacks, with images remaining unmodified during transmission, demonstrating strong robustness.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2021)

Article Computer Science, Information Systems

Coverless Image Steganography Based on Optical Mark Recognition and Machine Learning

Al Hussien S. Saad et al.

Summary: Steganography is a method used to secure sensitive information by concealing it within digital carriers, such as images, videos, and audio. Traditional image steganography methods embed secret messages by modifying pixels in cover images, but these modifications can be detected by steganalysis algorithms. A coverless data hiding concept has been proposed to address this issue, allowing secret messages to be embedded by generating cover files or mappings.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector

Ramadhan J. Mstafa et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study

Leonardo Horn Iwaya et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

TR-Model. A Metadata Profile Application for Personal Data Transparency

Thiago Adriano Coleti et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A Novel Coverless Information Hiding Method Based on the Most Significant Bit of the Cover Image

Lina Yang et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Financial Big Data Analysis and Early Warning Platform: A Case Study

Yi Liang et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

AHCM: Adaptive Huffman Code Mapping for Audio Steganography Based on Psychoacoustic Model

Xiaowei Yi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

Zhili Zhou et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Coverless Image Steganography: A Survey

Jiaohua Qin et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Personal Data Trading Scheme for Data Brokers in IoT Data Marketplaces

Hyeontaek Oh et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Coverless Plain Text Steganography Based on Character Features

Kaixi Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Cover Selection HEVC Video Steganography Based on Intra Prediction Mode

Jie Wang et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

Xiang Zhang et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)