loading
Secure 2D Image Steganography Using Recamán's Sequence
2019 Edition, April 1, 2019 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

This paper presents a double -layer secure message scheme. The first layer is of a cryptographic nature, where the Data Encryption Standard (DES), CAST5 or Blowfish is firstly applied on the message bits for a higher security level. However, the second layer is of steganographic nature,...

Towards Robust Image Steganography
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The behavior of posting images on social network platforms is happened everywhere and every single second. Thus, the communication channels offered by various social networks have a great potential for covert communication. However, images transmitted through such channels will...

Generative Steganography by Sampling
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

In this paper, a novel data-driven information hiding scheme called "generative steganography by sampling" (GSS) is proposed. Unlike in traditional modification-based steganography, in our method the stego image is directly sampled by a powerful generator: no explicit cover is...

An Accurate Texture Complexity Estimation for Quality-Enhanced and Secure Image Steganography
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Content-adaptive steganography intends to hide data in the complex texture content of the image. Recently, some secure steganography methods have been proposed to identify the textural complexity of an image. However, most of the techniques do not take into...

Security Enhancements for High Quality Image Transaction with Hybrid Image Steganography Algorithm
2018 Edition, February 1, 2018 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Steganography is technique of hiding a secret (coded) message within an ordinary message.The purpose of steganography is to keep the information under covers while both the sender and the receiver share the information. Steganography and cryptography are firmly related,...

Practical Cover Selection for Steganography
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

This paper focus on a practical scenario of cover selection for steganography, in which a part of the available images of the sender have been processed to improve visual quality, e.g., contrast enhancement, image denoising. In this case, not only the embedding distortion...

On security enhancement of steganography via generative adversarial image
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Steganography plays an important role in information hiding. With the development of steganalysis, traditional steganography faces more detection threat. It is necessary to improve security of current steganographic methods. One effective way is to generate suitable covers for...

Matrix Coding-Based Quantum Image Steganography Algorithm
Volume PP - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Embedding secret information into quantum carrier image for covert communication is one of significant research fields of quantum secure communication. Using good imperceptibility and high embedding efficiency of matrix coding, this paper proposes a novel matrix coding-based...

Coverless Image Steganography: A Survey
2019 Edition, Volume 7, January 1, 2019 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

With the digitalization of information, a lot of multimedia data are under attack, information security has become a key issue of public concern. Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and...

Joint Transaction-Image Steganography for High Capacity Covert Communication
2019 Edition, October 1, 2019 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Conventional secret communications suffer from communication channel insecurity and lack of secrecy. Blockchain-based steganography comes up by proposing secure communication channel with the expense of low message capacity. In this paper, we propose joint steganography by...

Advertisement