Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer
H Li, Y Zhang, J Wang, W Zhang… - Chinese Journal of …, 2024 - ieeexplore.ieee.org
Existing deep learning-based steganography detection methods utilize convolution to
automatically capture and learn steganographic features, yielding higher detection efficiency …
automatically capture and learn steganographic features, yielding higher detection efficiency …
Global texture sensitive convolutional transformer for medical image steganalysis
Steganography is often used by hackers or illegal organizations as a vehicle for information
interception of medical images. Exchanged between PACS or communicated during …
interception of medical images. Exchanged between PACS or communicated during …
A novel method for linguistic steganography by English translation using attention mechanism and probability distribution theory
YQ Lin, ZH Wang - Plos one, 2024 - journals.plos.org
To enhance our ability to model long-range semantical dependencies, we introduce a novel
approach for linguistic steganography through English translation. This method leverages …
approach for linguistic steganography through English translation. This method leverages …
General Steganalysis of Generative Linguistic Steganography Based on Dynamic Segment-level Lexical Association Extraction
S Li, H Du, J Wang - IEEE Signal Processing Letters, 2024 - ieeexplore.ieee.org
In scenarios where steganographic texts from various steganographic domains generated
by different generative steganography algorithms are mixed, most existing linguistic …
by different generative steganography algorithms are mixed, most existing linguistic …
Spatio-temporal graph Convolution Transformer for Video Question Answering
J Tang, J Hu, W Huang, S Shen, J Pan, D Wang… - IEEE …, 2024 - ieeexplore.ieee.org
Currently, video question answering (VideoQA) algorithms relying on video-text pretraining
models employ intricate unimodal encoders and multimodal fusion Transformers, which …
models employ intricate unimodal encoders and multimodal fusion Transformers, which …
State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research
With the evolution of generative linguistic steganography techniques, conventional
steganalysis falls short in robustly quantifying the alterations induced by steganography …
steganalysis falls short in robustly quantifying the alterations induced by steganography …
Generative Adversarial Networks for Artificial Satellite Image Creation and Manipulation
S Ghelichkhani, YAMAD Salem, H Salahov… - Adversarial Multimedia …, 2023 - Springer
In the research conducted and reported herein, we demonstrate the ability to generate and
manipulate synthetic satellite images by employing a set of deep learning architectures (DL) …
manipulate synthetic satellite images by employing a set of deep learning architectures (DL) …
CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks
The generative linguistic steganography in social networks have potential huge abuse and
regulatory risks, with serious implications for information security, especially in the era of …
regulatory risks, with serious implications for information security, especially in the era of …
Linguistic Steganography and Linguistic Steganalysis
H Wu, T Yang, X Zheng, Y Fang - Adversarial Multimedia Forensics, 2023 - Springer
The objective of linguistic steganography is to embed additional data in text carriers for
covert communication, whereas linguistic steganalysis, as a counter technology to linguistic …
covert communication, whereas linguistic steganalysis, as a counter technology to linguistic …
An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)
KD Michelle, OG Gilibrays… - Journal of Independent …, 2024 - jisrc.szabist.edu.pk
Text teganography is a method used to hide confidential messages in a message's text
without arousing suspicion. This technique has been used in the past, from ancient Greece's …
without arousing suspicion. This technique has been used in the past, from ancient Greece's …