A review of coverless steganography

L Meng, X Jiang, T Sun - Neurocomputing, 2024 - Elsevier
With the enhancement of people's security awareness, transmitting secret information
securely has gradually become a demand for the public. Steganography is a technology of …

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

DeepMIH: Deep invertible network for multiple image hiding

Z Guan, J **g, X Deng, M Xu, L Jiang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Multiple image hiding aims to hide multiple secret images into a single cover image, and
then recover all secret images perfectly. Such high-capacity hiding may easily lead to …

Cross: Diffusion model makes controllable, robust and secure image steganography

J Yu, X Zhang, Y Xu, J Zhang - Advances in Neural …, 2024 - proceedings.neurips.cc
Current image steganography techniques are mainly focused on cover-based methods,
which commonly have the risk of leaking secret images and poor robustness against …

Self-attention enhanced deep residual network for spatial image steganalysis

G **e, J Ren, S Marshall, H Zhao, R Li, R Chen - Digital signal processing, 2023 - Elsevier
As a specially designed tool and technique for the detection of image steganography, image
steganalysis conceals information under the carriers for covert communications. Being …

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …

A convolutional neural network to detect possible hidden data in spatial domain images

JDLC Ntivuguruzwa, T Ahmad - Cybersecurity, 2023 - Springer
Hiding secret data in digital multimedia has been essential to protect the data. Nevertheless,
attackers with a steganalysis technique may break them. Existing steganalysis methods …

Hybrid convolutional neural network-multilayer perceptron model for solar radiation prediction

S Ghimire, T Nguyen-Huy, R Prasad, RC Deo… - Cognitive …, 2023 - Springer
Urgent transition from the dependence on fossil fuels towards renewable energies requires
more solar photovoltaic power to be connected to the electricity grids, with reliable supply …

A survey on siamese network: Methodologies, applications, and opportunities

Y Li, CLP Chen, T Zhang - IEEE Transactions on artificial …, 2022 - ieeexplore.ieee.org
Siamese network has obtained growing attention in real-life applications. In this survey, we
present an comprehensive review on Siamese network from the aspects of methodologies …

Deep adaptive hiding network for image hiding using attentive frequency extraction and gradual depth extraction

L Zhang, Y Lu, J Li, F Chen, G Lu, D Zhang - Neural Computing and …, 2023 - Springer
Image hiding secures information security in multimedia communication. Existing deep
image hiding methods usually process the secret and cover information at first, and then …