Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism

    Nannan Wu1, Xianyi Chen1,*, James Msughter Adeke2, Junjie Zhao2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3001-3019, 2024, DOI:10.32604/cmc.2023.045311 - 26 March 2024

    Abstract Recently, deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding. However, these approaches have some limitations. For example, a cover image lacks self-adaptability, information leakage, or weak concealment. To address these issues, this study proposes a universal and adaptable image-hiding method. First, a domain attention mechanism is designed by combining the Atrous convolution, which makes better use of the relationship between the secret image domain and the cover image domain. Second, to improve perceived human similarity, perceptual loss is incorporated into the training process. The experimental results are promising, with More >

  • Open Access

    ARTICLE

    High Visual Quality Image Steganography Based on Encoder-Decoder Model

    Yan Wang*, Zhangjie Fu, Xingming Sun

    Journal of Cyber Security, Vol.2, No.3, pp. 115-121, 2020, DOI:10.32604/jcs.2020.012275 - 14 September 2020

    Abstract Nowadays, with the popularization of network technology, more and more people are concerned about the problem of cyber security. Steganography, a technique dedicated to protecting peoples’ private data, has become a hot topic in the research field. However, there are still some problems in the current research. For example, the visual quality of dense images generated by some steganographic algorithms is not good enough; the security of the steganographic algorithm is not high enough, which makes it easy to be attacked by others. In this paper, we propose a novel high visual quality image More >

  • Open Access

    ARTICLE

    Reversible Data Hiding Based on Run-Level Coding in H.264/AVC Video Streams

    Yi Chen1, Hongxia Wang2, *, Xuyun Zhang3

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 911-922, 2020, DOI:10.32604/cmc.2020.08027 - 01 May 2020

    Abstract This paper presents a reversible data hiding (RDH) method, which is designed by combining histogram modification (HM) with run-level coding in H.264/advanced video coding (AVC). In this scheme, the run-level is changed for embedding data into H.264/AVC video sequences. In order to guarantee the reversibility of the proposed scheme, the last nonzero quantized discrete cosine transform (DCT) coefficients in embeddable 4×4 blocks are shifted by the technology of histogram modification. The proposed scheme is realized after quantization and before entropy coding of H.264/AVC compression standard. Therefore, the embedded information can be correctly extracted at the More >

  • Open Access

    ARTICLE

    Coverless Image Steganography Method Based on Feature Selection

    Anqi Qiu1,2, Xianyi Chen1,2, Xingming Sun1,2,*, Shuai Wang3, Guo Wei4

    Journal of Information Hiding and Privacy Protection, Vol.1, No.2, pp. 49-60, 2019, DOI:10.32604/jihpp.2019.05881

    Abstract A new information hiding technology named coverless information hiding is proposed. It uses original natural images as stego images to represent secret information. The focus of coverless image steganography method is how to represent image features and establish a map relationship between image feature and the secret information. In this paper, we use three kinds of features which are Local Binary Pattern (LBP), the mean value of pixels and the variance value of pixels. On this basis, we realize the transmission of secret information. Firstly, the hash sequence of the original cover image is obtained More >

Displaying 1-10 on page 1 of 4. Per Page