The infinite race between steganography and steganalysis in images
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
Coverless image steganography based on generative adversarial network
J Qin, J Wang, Y Tan, H Huang, X Xiang, Z He - Mathematics, 2020 - mdpi.com
Traditional image steganography needs to modify or be embedded into the cover image for
transmitting secret messages. However, the distortion of the cover image can be easily …
transmitting secret messages. However, the distortion of the cover image can be easily …
Improving robust adaptive steganography via minimizing channel errors
Abstract Online Social Networks (OSNs) are becoming increasingly entrenched in peoples
lives and a huge number of images are shared on them every day, which are well-suited …
lives and a huge number of images are shared on them every day, which are well-suited …
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction
Transmitting images for communication on social networks has become routine, which is
helpful for covert communication. The traditional steganography algorithm is unable to …
helpful for covert communication. The traditional steganography algorithm is unable to …
Image robust adaptive steganography adapted to lossy channels in open social networks
Y Zhang, X Luo, J Wang, Y Guo, F Liu - Information Sciences, 2021 - Elsevier
Currently, the demand for covert communication in open social networks brings new
opportunities and challenges to existing image steganography technology in terms of …
opportunities and challenges to existing image steganography technology in terms of …
Towards Secure and Robust Steganography for Black-box Generated Images
The progression of text-to-image generation models has incited an upsurge in disseminating
generated images across social networks, providing a fertile ground for steganography …
generated images across social networks, providing a fertile ground for steganography …
High-capacity image steganography based on improved Xception
X Duan, M Gou, N Liu, W Wang, C Qin - Sensors, 2020 - mdpi.com
The traditional cover modification steganography method only has low steganography
ability. We propose a steganography method based on the convolutional neural network …
ability. We propose a steganography method based on the convolutional neural network …
Robust adaptive steganography based on dither modulation and modification with re-compression
Z Yin, L Ke - IEEE Transactions on Signal and Information …, 2021 - ieeexplore.ieee.org
Traditional adaptive steganography is a technique used for covert communication with high
security, but it is invalid in the case of stego images are sent to legal receivers over networks …
security, but it is invalid in the case of stego images are sent to legal receivers over networks …
Image sanitization in online social networks: A general framework for breaking robust information hiding
With the development of robust information hiding (RIH) approaches, secret messages can
be extracted successfully from stego-data after transmission through lossy channels of …
be extracted successfully from stego-data after transmission through lossy channels of …
Enhancing Data Security through Hybrid Error Detection: Combining Cyclic Redundancy Check (CRC) and Checksum Techniques
AH Saleh, MS Mohammed - International Journal of …, 2024 - ijeer.forexjournal.co.in
Error detection is a critical aspect of ensuring the accuracy of data transmission in
communication systems. In this study, the performance of two error detection techniques has …
communication systems. In this study, the performance of two error detection techniques has …