Recent advances of image steganography with generative adversarial networks
J Liu, Y Ke, Z Zhang, Y Lei, J Li, M Zhang… - IEEE Access, 2020 - ieeexplore.ieee.org
In the past few years, the Generative Adversarial Network (GAN), which proposed in 2014,
has achieved great success. There have been increasing research achievements based on …
has achieved great success. There have been increasing research achievements based on …
A novel image steganography method via deep convolutional generative adversarial networks
The security of image steganography is an important basis for evaluating steganography
algorithms. Steganography has recently made great progress in the long-term confrontation …
algorithms. Steganography has recently made great progress in the long-term confrontation …
Secret-to-image reversible transformation for generative steganography
Z Zhou, Y Su, J Li, K Yu, QMJ Wu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, generative steganography that transforms secret information to a generated image
has been a promising technique to resist steganalysis detection. However, due to the …
has been a promising technique to resist steganalysis detection. However, due to the …
Reversible image steganography scheme based on a U-Net structure
Traditional steganography methods often hide secret data by establishing a map**
relationship between secret data and a cover image or directly in a noisy area, but has a low …
relationship between secret data and a cover image or directly in a noisy area, but has a low …
Robust coverless image steganography based on DCT and LDA topic classification
In order to improve the robustness and capability of resisting image steganalysis, a novel
coverless image steganography algorithm based on discrete cosine transform and latent …
coverless image steganography algorithm based on discrete cosine transform and latent …
A sensitive dynamic mutual encryption system based on a new 1D chaotic map
In this research paper, we propose a novel one-dimensional chaotic system based on the
fraction of cosine over sine (1-DFCS). Evaluation of 1-DFCS indicates the existence of a …
fraction of cosine over sine (1-DFCS). Evaluation of 1-DFCS indicates the existence of a …
A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network
Image steganography is a technology that hides sensitive information into an image. The
traditional image steganography method tends to securely embed secret information in the …
traditional image steganography method tends to securely embed secret information in the …
Generative steganography network
Steganography usually modifies cover media to embed secret data. A new steganographic
approach called generative steganography (GS) has emerged recently, in which stego …
approach called generative steganography (GS) has emerged recently, in which stego …
Coverless information hiding based on robust image hashing
S Zheng, L Wang, B Ling, D Hu - … , ICIC 2017, Liverpool, UK, August 7-10 …, 2017 - Springer
Traditional image steganography modifies the content of the image more or less, it is hard to
resist the detection of image steganalysis tools. New kind of steganography methods …
resist the detection of image steganalysis tools. New kind of steganography methods …
A new one-dimensional cosine polynomial chaotic map and its use in image encryption
In this paper, we propose a new real one-dimensional cosine polynomial (1-DCP) chaotic
map. The statistical analysis of the proposed map shows that it has a simple structure, a high …
map. The statistical analysis of the proposed map shows that it has a simple structure, a high …