STEGANOGRAPHY

作品数:152被引量:190H指数:7
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:陈火旺更多>>
相关机构:湖南大学华中科技大学国防科学技术大学北京邮电大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金国家重点基础研究发展计划国家教育部博士点基金广东省自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
E-SWAN:Efficient Sliding Window Analysis Network for Real-Time Speech Steganography Detection
《Computers, Materials & Continua》2025年第3期4797-4820,共24页Kening Wang Feipeng Gao Jie Yang Hao Zhang 
supported in part by the Zhejiang Provincial Natural Science Foundation of China under Grant LQ20F020004;in part by the National College Student Innovation and Research Training Program under Grant 202313283002.
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant c...
关键词:STEGANALYSIS SPEECH convolutional sliding window deep learning 
A Shuffling-Steganography Algorithm to Protect Data of Drone Applications
《Computers, Materials & Continua》2024年第11期2727-2751,共25页Ahamad B.Alkodre Nour Mahmoud Bahbouh Sandra Sendra Adnan Ahmed Abi Sen Yazed Alsaawy Saad Said Alqahtany Abdallah Namoun Hani Almoamari 
funded by the Research Deanship of the Islamic University of Madinah under grant number 966.
In Saudi Arabia,drones are increasingly used in different sensitive domains like military,health,and agriculture to name a few.Typically,drone cameras capture aerial images of objects and convert them into crucial dat...
关键词:Health of palm trees steganography based text steganography based image DRONE fog computing security 
A Dynamic YOLO-Based Sequence-Matching Model for Efficient Coverless Image Steganography
《Computers, Materials & Continua》2024年第11期3221-3240,共20页Jiajun Liu Lina Tan Zhili Zhou Weijin Jiang Yi Li Peng Chen 
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images st...
关键词:Coverless STEGANOGRAPHY object detection YOLO 
A Linked List Encryption Scheme for Image Steganography without Embedding
《Computer Modeling in Engineering & Sciences》2024年第10期331-352,共22页Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou 
supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047);the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039);the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148);the CCF-Baidu Open Fund(No.202312);the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...
关键词:STEGANOGRAPHY ENCRYPTION steganography without embedding coverless steganography 
Image Steganography by Pixel-Value Differencing Using General Quantization Ranges
《Computer Modeling in Engineering & Sciences》2024年第10期353-383,共31页Da-Chun Wu Zong-Nan Shih 
A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a ...
关键词:STEGANOGRAPHY pixel-value differencing multiple-based number conversion general quantization range 
A Single-Sized Metasurface for Image Steganography and Multi-Key Information Encryption
《Engineering》2024年第10期61-70,共10页Congling Liang Tian Huang Qi Dai Zile Li Shaohua Yu 
supported by the National Natural Science Foundation of China(12204359 and 12174292);the China Postdoctoral Science Foundation(2022TQ0243 and 2022M722448);the Natural Science Foundation of Hubei Province(2022CFB641);the Natural Science Foundation of Jiangsu Province(BK20231210).
With the escalating flow of information and digital communication,information security has become an increasingly important issue.Traditional cryptographic methods are being threatened by advancing progress in computi...
关键词:Metasurface MULTI-CHANNEL STEGANOGRAPHY ENCRYPTION 
Digital Image Steganographer Identification:A Comprehensive Survey
《Computers, Materials & Continua》2024年第10期105-131,共27页Qianqian Zhang Yi Zhang Yuanyuan Ma Yanmei Liu Xiangyang Luo 
supported by the National Key Research and Development Program of China(No.2022YFB3102900);the National Natural Science Foundation of China(Nos.62172435,62202495 and 62002103);Zhongyuan Science and Technology Innovation Leading Talent Project of China(No.214200510019);Key Research and Development Project of Henan Province(No.2211321200);the Natural Science Foundation of Henan Province(No.222300420058).
The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins ...
关键词:Information hiding STEGANALYSIS steganographer identification STEGANOGRAPHY covert communication SURVEY 
Constructive Robust Steganography Algorithm Based on Style Transfer
《Computers, Materials & Continua》2024年第10期1433-1448,共16页Xiong Zhang Minqing Zhang Xu’an Wang Siyuan Huang Fuqiang Di 
the National Natural Science Foundation of China(Nos.62272478,61872384,62172436,62102451);Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584);Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both ...
关键词:Information hiding neural style transfer ROBUSTNESS map dictionary 
An Improved Image Steganography Security and Capacity Using Ant Colony Algorithm Optimization
《Computers, Materials & Continua》2024年第9期4643-4662,共20页Zinah Khalid Jasim Jasim Sefer Kurnaz 
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul...
关键词:STEGANOGRAPHY STEGANALYSIS capacity optimization ant colony algorithm 
Blockchain Meets Generative Behavior Steganography:A Novel Covert Communication Framework for Secure IoT Edge Computing
《Chinese Journal of Electronics》2024年第4期886-898,共13页Yuanlong CAO Junjie LI Kailin CHAO Jianmao XIAO Gang LEI 
The rapid development of Internet of things(Io T) and edge computing technologies has brought forth numerous possibilities for the intelligent and digital future. The frequent communication and interaction between dev...
关键词:Internet of things Edge computing Blockchain Covert communication Communication security Generative behavior steganography 
检索报告 对象比较 聚类工具 使用帮助 返回顶部