A review of coverless steganography
With the enhancement of people's security awareness, transmitting secret information
securely has gradually become a demand for the public. Steganography is a technology of …
securely has gradually become a demand for the public. Steganography is a technology of …
Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
DeepMIH: Deep invertible network for multiple image hiding
Multiple image hiding aims to hide multiple secret images into a single cover image, and
then recover all secret images perfectly. Such high-capacity hiding may easily lead to …
then recover all secret images perfectly. Such high-capacity hiding may easily lead to …
Cross: Diffusion model makes controllable, robust and secure image steganography
Current image steganography techniques are mainly focused on cover-based methods,
which commonly have the risk of leaking secret images and poor robustness against …
which commonly have the risk of leaking secret images and poor robustness against …
Self-attention enhanced deep residual network for spatial image steganalysis
G **e, J Ren, S Marshall, H Zhao, R Li, R Chen - Digital signal processing, 2023 - Elsevier
As a specially designed tool and technique for the detection of image steganography, image
steganalysis conceals information under the carriers for covert communications. Being …
steganalysis conceals information under the carriers for covert communications. Being …
A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques
MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …
major concern in the communication environment, where security must be performed for the …
A convolutional neural network to detect possible hidden data in spatial domain images
Hiding secret data in digital multimedia has been essential to protect the data. Nevertheless,
attackers with a steganalysis technique may break them. Existing steganalysis methods …
attackers with a steganalysis technique may break them. Existing steganalysis methods …
Hybrid convolutional neural network-multilayer perceptron model for solar radiation prediction
Urgent transition from the dependence on fossil fuels towards renewable energies requires
more solar photovoltaic power to be connected to the electricity grids, with reliable supply …
more solar photovoltaic power to be connected to the electricity grids, with reliable supply …
A survey on siamese network: Methodologies, applications, and opportunities
Siamese network has obtained growing attention in real-life applications. In this survey, we
present an comprehensive review on Siamese network from the aspects of methodologies …
present an comprehensive review on Siamese network from the aspects of methodologies …
Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction
Image hiding secures information security in multimedia communication. Existing deep
image hiding methods usually process the secret and cover information at first, and then …
image hiding methods usually process the secret and cover information at first, and then …