A review of coverless steganography

L Meng, X Jiang, T Sun - Neurocomputing, 2024 - Elsevier
With the enhancement of people's security awareness, transmitting secret information
securely has gradually become a demand for the public. Steganography is a technology of …

The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

Study on an improved adaptive PSO algorithm for solving multi-objective gate assignment

W Deng, H Zhao, X Yang, J **
Q Liu, X **ang, J Qin, Y Tan, J Tan, Y Luo - Knowledge-Based Systems, 2020 - Elsevier
Recently, researches have shown that coverless image steganography can resist the
existing steganalysis tools effectively. On this basis, a novel coverless image steganography …

Coverless real-time image information hiding based on image block matching and dense convolutional network

Y Luo, J Qin, X **ang, Y Tan, Q Liu, L **ang - Journal of Real-Time Image …, 2020 - Springer
Abstract Information security has become a key issue of public concern recently. In order to
radically resist the decryption and analysis in the field of image information hiding and …

Coverless image steganography using partial-duplicate image retrieval

Z Zhou, Y Mu, QMJ Wu - Soft Computing, 2019 - Springer
Most of the existing image steganographic approaches embed the secret information
imperceptibly into a cover image by slightly modifying its content. However, the modification …

Coverless image steganography based on multi-object recognition

Y Luo, J Qin, X **ang, Y Tan - IEEE Transactions on Circuits …, 2020 - ieeexplore.ieee.org
Most of the existing coverless steganography approaches have poor robustness to
geometric attacks, because these approaches use features of the entire image to map …

A hybrid multi-objective firefly algorithm for big data optimization

H Wang, W Wang, L Cui, H Sun, J Zhao, Y Wang… - Applied Soft …, 2018 - Elsevier
Multi-objective evolutionary algorithms (MOEAs) have shown good performance on many
benchmark and real world multi-objective optimization problems. However, MOEAs may …

A novel coverless information hiding method based on the average pixel value of the sub-images

L Zou, J Sun, M Gao, W Wan, BB Gupta - Multimedia tools and …, 2019 - Springer
In traditional information hiding methods, the secret information is embedded into the
carriers, which will inevitably leave traces of modification on the carriers. In those methods …