Learning-based image steganography and watermarking: A survey
K Hu, M Wang, X Ma, J Chen, X Wang… - Expert Systems with …, 2024 - Elsevier
Extensive research has been conducted on image steganography and watermarking
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …
algorithms, owing to their crucial rules in secret data transmission, copyright protection, and …
A survey on Deep-Learning-based image steganography
With the development of Internet and multimedia development, digital image steganography
is becoming more extensive in transmitting data with high capacity and security. Although …
is becoming more extensive in transmitting data with high capacity and security. Although …
Multiplexing optical images for steganography by single metasurfaces
Image steganography based on intelligent devices is one of the effective routes for safely
and quickly transferring secret information. However, optical image steganography has …
and quickly transferring secret information. However, optical image steganography has …
On mask-based image set desensitization with recognition support
Abstract In recent years, Deep Neural Networks (DNN) have emerged as a practical method
for image recognition. The raw data, which contain sensitive information, are generally …
for image recognition. The raw data, which contain sensitive information, are generally …
Steganography for medical record image
Medical record images in EHR system are users' privacy and an asset, and there is an
urgent need to protect this data. Image steganography can offer a potential solution. A …
urgent need to protect this data. Image steganography can offer a potential solution. A …
Cancelable Face Recognition Using Deep Steganography
K Ito, T Kozu, H Kawai, G Hanawa… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In biometrics, the secure transfer and storage of biometric samples are important for
protecting the privacy and security of the data subject. One of the methods for authentication …
protecting the privacy and security of the data subject. One of the methods for authentication …
StegaEdge: learning edge-guidance steganography
K Hu, Z Huang, X Wang, X Wang - The Visual Computer, 2023 - Springer
Steganography is critical in traceability, authentication, and secret delivery for multimedia. In
this paper, we propose a novel image steganography framework, named StegaEdge, via …
this paper, we propose a novel image steganography framework, named StegaEdge, via …
Deep Model Intellectual Property Protection with Compression-Resistant Model Watermarking
Deep learning is considered a promising technology for empowering the Industrial Internet
of Things (IIoT) with intelligence. However, the application of deep learning in the industrial …
of Things (IIoT) with intelligence. However, the application of deep learning in the industrial …
Meta Security Metric Learning for Secure Deep Image Hiding
Deep Image Hiding (DIH) aims to imperceptibly hide images within image. To improve its
security performance, some DIH methods design Security Metrics (SMs) to guide the …
security performance, some DIH methods design Security Metrics (SMs) to guide the …
FedSteg: Coverless Steganography‐Based Privacy‐Preserving Decentralized Federated Learning
M Xu, Y Lin - IEEJ Transactions on Electrical and Electronic …, 2024 - Wiley Online Library
Federated learning (FL) represents a novel privacy‐preserving learning paradigm that offers
a practical solution for distributed privacy preservation. Although privacy‐preserving FL …
a practical solution for distributed privacy preservation. Although privacy‐preserving FL …