Learning-based image steganography and watermarking: A survey

K Hu, M Wang, X Ma, J Chen, X Wang… - Expert Systems with …, 2024 - Elsevier
Extensive research has been conducted on image steganography and watermarking
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …

A survey on Deep-Learning-based image steganography

B Song, P Wei, S Wu, Y Lin, W Zhou - Expert Systems with Applications, 2024 - Elsevier
With the development of Internet and multimedia development, digital image steganography
is becoming more extensive in transmitting data with high capacity and security. Although …

Multiplexing optical images for steganography by single metasurfaces

Y Cao, L Tang, J Li, C Lee, ZG Dong - Small, 2023 - Wiley Online Library
Image steganography based on intelligent devices is one of the effective routes for safely
and quickly transferring secret information. However, optical image steganography has …

On mask-based image set desensitization with recognition support

Q Li, J Liu, Y Sun, C Zhang, D Dou - Applied Intelligence, 2024 - Springer
Abstract In recent years, Deep Neural Networks (DNN) have emerged as a practical method
for image recognition. The raw data, which contain sensitive information, are generally …

Steganography for medical record image

C Hua, Y Wu, Y Shi, M Hu, R **e, G Zhai… - Computers in Biology …, 2023 - Elsevier
Medical record images in EHR system are users' privacy and an asset, and there is an
urgent need to protect this data. Image steganography can offer a potential solution. A …

Cancelable Face Recognition Using Deep Steganography

K Ito, T Kozu, H Kawai, G Hanawa… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In biometrics, the secure transfer and storage of biometric samples are important for
protecting the privacy and security of the data subject. One of the methods for authentication …

StegaEdge: learning edge-guidance steganography

K Hu, Z Huang, X Wang, X Wang - The Visual Computer, 2023 - Springer
Steganography is critical in traceability, authentication, and secret delivery for multimedia. In
this paper, we propose a novel image steganography framework, named StegaEdge, via …

Deep Model Intellectual Property Protection with Compression-Resistant Model Watermarking

H Nie, S Lu, J Wu, J Zhu - IEEE Transactions on Artificial …, 2024 - ieeexplore.ieee.org
Deep learning is considered a promising technology for empowering the Industrial Internet
of Things (IIoT) with intelligence. However, the application of deep learning in the industrial …

Meta Security Metric Learning for Secure Deep Image Hiding

Q Cui, W Tang, Z Zhou, R Meng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep Image Hiding (DIH) aims to imperceptibly hide images within image. To improve its
security performance, some DIH methods design Security Metrics (SMs) to guide the …

FedSteg: Coverless Steganography‐Based Privacy‐Preserving Decentralized Federated Learning

M Xu, Y Lin - IEEJ Transactions on Electrical and Electronic …, 2024 - Wiley Online Library
Federated learning (FL) represents a novel privacy‐preserving learning paradigm that offers
a practical solution for distributed privacy preservation. Although privacy‐preserving FL …