Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of coverless steganography
With the enhancement of people's security awareness, transmitting secret information
securely has gradually become a demand for the public. Steganography is a technology of …
securely has gradually become a demand for the public. Steganography is a technology of …
The infinite race between steganography and steganalysis in images
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
Study on an improved adaptive PSO algorithm for solving multi-objective gate assignment
W Deng, H Zhao, X Yang, J **
Recently, researches have shown that coverless image steganography can resist the
existing steganalysis tools effectively. On this basis, a novel coverless image steganography …
existing steganalysis tools effectively. On this basis, a novel coverless image steganography …
Coverless real-time image information hiding based on image block matching and dense convolutional network
Abstract Information security has become a key issue of public concern recently. In order to
radically resist the decryption and analysis in the field of image information hiding and …
radically resist the decryption and analysis in the field of image information hiding and …
Coverless image steganography using partial-duplicate image retrieval
Z Zhou, Y Mu, QMJ Wu - Soft Computing, 2019 - Springer
Most of the existing image steganographic approaches embed the secret information
imperceptibly into a cover image by slightly modifying its content. However, the modification …
imperceptibly into a cover image by slightly modifying its content. However, the modification …
Coverless image steganography based on multi-object recognition
Y Luo, J Qin, X **ang, Y Tan - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
Most of the existing coverless steganography approaches have poor robustness to
geometric attacks, because these approaches use features of the entire image to map …
geometric attacks, because these approaches use features of the entire image to map …
A hybrid multi-objective firefly algorithm for big data optimization
Multi-objective evolutionary algorithms (MOEAs) have shown good performance on many
benchmark and real world multi-objective optimization problems. However, MOEAs may …
benchmark and real world multi-objective optimization problems. However, MOEAs may …
A novel coverless information hiding method based on the average pixel value of the sub-images
In traditional information hiding methods, the secret information is embedded into the
carriers, which will inevitably leave traces of modification on the carriers. In those methods …
carriers, which will inevitably leave traces of modification on the carriers. In those methods …