Light field messaging with deep photographic steganography
Abstract We develop Light Field Messaging (LFM), a process of embedding, transmitting,
and receiving hidden information in video that is displayed on a screen and captured by a …
and receiving hidden information in video that is displayed on a screen and captured by a …
Attention based data hiding with generative adversarial networks
C Yu - Proceedings of the AAAI conference on artificial …, 2020 - ojs.aaai.org
Recently, the generative adversarial network is the hotspot in research and industrial areas.
Its application on data generation is the most common usage. In this paper, we propose the …
Its application on data generation is the most common usage. In this paper, we propose the …
[PDF][PDF] Fixed neural network steganography: Train the images, not the network
Recent attempts at image steganography make use of advances in deep learning to train an
encoder-decoder network pair to hide and retrieve secret messages in images. These …
encoder-decoder network pair to hide and retrieve secret messages in images. These …
Learning iterative neural optimizers for image steganography
Image steganography is the process of concealing secret information in images through
imperceptible changes. Recent work has formulated this task as a classic constrained …
imperceptible changes. Recent work has formulated this task as a classic constrained …
[HTML][HTML] Latent Diffusion Models for Image Watermarking: A Review of Recent Trends and Future Directions
H Hur, M Kang, S Seo, JU Hou - Electronics, 2024 - mdpi.com
Recent advancements in deep learning-based generative models have simplified image
generation, increasing the need for improved source tracing and copyright protection …
generation, increasing the need for improved source tracing and copyright protection …
[PDF][PDF] VStegNET: Video Steganography Network using Spatio-Temporal features and Micro-Bottleneck.
Steganography is the practice of hiding a secret message in a cover message such that the
cover stays indiscernible after hiding and only the intended recipients can extract the secret …
cover stays indiscernible after hiding and only the intended recipients can extract the secret …
A character based steganography using masked language modeling
E Öztürk, AŞ Mesut, ÖA Fıdan - IEEE Access, 2024 - ieeexplore.ieee.org
In this study, a steganography method based on BERT transformer model is proposed for
hiding text data in cover text. The aim is to hide information by replacing specific words …
hiding text data in cover text. The aim is to hide information by replacing specific words …
Multi-stage residual hiding for image-into-audio steganography
The widespread application of audio communication technologies has speeded up audio
data flowing across the Internet, which made it a popular carrier for covert communication. In …
data flowing across the Internet, which made it a popular carrier for covert communication. In …
DHU-Net: High-capacity binary data hiding network based on improved U-Net
X Duan, C Li, B Wei, G Wu, C Qin, H Nam - Neurocomputing, 2024 - Elsevier
Due to limited data-hiding capacity and low extraction accuracy, most existing data hiding
schemes have difficulty in high capacity hiding and lossless extraction of binary data. This …
schemes have difficulty in high capacity hiding and lossless extraction of binary data. This …
Pixelsteganalysis: Pixel-wise hidden information removal with low visual degradation
Recently, the field of steganography has experienced rapid developments based on deep
learning (DL). DL based steganography distributes secret information over all the available …
learning (DL). DL based steganography distributes secret information over all the available …