Light field messaging with deep photographic steganography

E Wengrowski, K Dana - … of the IEEE/CVF conference on …, 2019 - openaccess.thecvf.com
Abstract We develop Light Field Messaging (LFM), a process of embedding, transmitting,
and receiving hidden information in video that is displayed on a screen and captured by a …

Attention based data hiding with generative adversarial networks

C Yu - Proceedings of the AAAI conference on artificial …, 2020 - ojs.aaai.org
Recently, the generative adversarial network is the hotspot in research and industrial areas.
Its application on data generation is the most common usage. In this paper, we propose the …

[PDF][PDF] Fixed neural network steganography: Train the images, not the network

V Kishore, X Chen, Y Wang, B Li… - International …, 2021 - drive.google.com
Recent attempts at image steganography make use of advances in deep learning to train an
encoder-decoder network pair to hide and retrieve secret messages in images. These …

Learning iterative neural optimizers for image steganography

X Chen, V Kishore, KQ Weinberger - The Eleventh International …, 2022 - openreview.net
Image steganography is the process of concealing secret information in images through
imperceptible changes. Recent work has formulated this task as a classic constrained …

[HTML][HTML] Latent Diffusion Models for Image Watermarking: A Review of Recent Trends and Future Directions

H Hur, M Kang, S Seo, JU Hou - Electronics, 2024 - mdpi.com
Recent advancements in deep learning-based generative models have simplified image
generation, increasing the need for improved source tracing and copyright protection …

[PDF][PDF] VStegNET: Video Steganography Network using Spatio-Temporal features and Micro-Bottleneck.

A Mishra, S Kumar, A Nigam, S Islam - BMVC, 2019 - researchgate.net
Steganography is the practice of hiding a secret message in a cover message such that the
cover stays indiscernible after hiding and only the intended recipients can extract the secret …

A character based steganography using masked language modeling

E Öztürk, AŞ Mesut, ÖA Fıdan - IEEE Access, 2024 - ieeexplore.ieee.org
In this study, a steganography method based on BERT transformer model is proposed for
hiding text data in cover text. The aim is to hide information by replacing specific words …

Multi-stage residual hiding for image-into-audio steganography

W Cui, S Liu, F Jiang, Y Liu… - ICASSP 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
The widespread application of audio communication technologies has speeded up audio
data flowing across the Internet, which made it a popular carrier for covert communication. In …

DHU-Net: High-capacity binary data hiding network based on improved U-Net

X Duan, C Li, B Wei, G Wu, C Qin, H Nam - Neurocomputing, 2024 - Elsevier
Due to limited data-hiding capacity and low extraction accuracy, most existing data hiding
schemes have difficulty in high capacity hiding and lossless extraction of binary data. This …

Pixelsteganalysis: Pixel-wise hidden information removal with low visual degradation

D Jung, H Bae, HS Choi, S Yoon - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Recently, the field of steganography has experienced rapid developments based on deep
learning (DL). DL based steganography distributes secret information over all the available …