supported in part by the Zhejiang Provincial Natural Science Foundation of China under Grant LQ20F020004;in part by the National College Student Innovation and Research Training Program under Grant 202313283002.
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant c...
funded by the Research Deanship of the Islamic University of Madinah under grant number 966.
In Saudi Arabia,drones are increasingly used in different sensitive domains like military,health,and agriculture to name a few.Typically,drone cameras capture aerial images of objects and convert them into crucial dat...
Many existing coverless steganography methods establish a mapping relationship between cover images and hidden data.One issue with these methods is that as the steganographic capacity increases,the number of images st...
supported in part by the National Natural Science Foundation of China(Nos.62372083,62072074,62076054,62027827,62002047);the Sichuan Science and Technology Innovation Platform and Talent Plan(No.2022JDJQ0039);the Sichuan Science and Technology Support Plan(Nos.2024NSFTD0005,2022YFQ0045,2022YFS0220,2023YFS0020,2023YFS0197,2023YFG0148);the CCF-Baidu Open Fund(No.202312);the Medico-Engineering Cooperation Funds from University of Electronic Science and Technology of China(Nos.ZYGX2021YGLH212,ZYGX2022YGRH012).
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...
A new steganographic method by pixel-value differencing(PVD)using general quantization ranges of pixel pairs’difference values is proposed.The objective of this method is to provide a data embedding technique with a ...
supported by the National Natural Science Foundation of China(12204359 and 12174292);the China Postdoctoral Science Foundation(2022TQ0243 and 2022M722448);the Natural Science Foundation of Hubei Province(2022CFB641);the Natural Science Foundation of Jiangsu Province(BK20231210).
With the escalating flow of information and digital communication,information security has become an increasingly important issue.Traditional cryptographic methods are being threatened by advancing progress in computi...
supported by the National Key Research and Development Program of China(No.2022YFB3102900);the National Natural Science Foundation of China(Nos.62172435,62202495 and 62002103);Zhongyuan Science and Technology Innovation Leading Talent Project of China(No.214200510019);Key Research and Development Project of Henan Province(No.2211321200);the Natural Science Foundation of Henan Province(No.222300420058).
The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins ...
the National Natural Science Foundation of China(Nos.62272478,61872384,62172436,62102451);Natural Science Foundation of Shanxi Province(No.2023-JC-YB-584);Engineering University of PAP’s Funding for Key Researcher(No.KYGG202011).
Traditional information hiding techniques achieve information hiding by modifying carrier data,which can easily leave detectable traces that may be detected by steganalysis tools.Especially in image transmission,both ...
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul...
The rapid development of Internet of things(Io T) and edge computing technologies has brought forth numerous possibilities for the intelligent and digital future. The frequent communication and interaction between dev...