Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (21)
  • Open Access


    Robust Information Hiding Based on Neural Style Transfer with Artificial Intelligence

    Xiong Zhang1,2, Minqing Zhang1,2,3,*, Xu An Wang1,2,3, Wen Jiang1,2, Chao Jiang1,2, Pan Yang1,4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1925-1938, 2024, DOI:10.32604/cmc.2024.050899

    Abstract This paper proposes an artificial intelligence-based robust information hiding algorithm to address the issue of confidential information being susceptible to noise attacks during transmission. The algorithm we designed aims to mitigate the impact of various noise attacks on the integrity of secret information during transmission. The method we propose involves encoding secret images into stylized encrypted images and applies adversarial transfer to both the style and content features of the original and embedded data. This process effectively enhances the concealment and imperceptibility of confidential information, thereby improving the security of such information during transmission and… More >

  • Open Access


    Topic Controlled Steganography via Graph-to-Text Generation

    Bowen Sun1, Yamin Li1,2,3,*, Jun Zhang1, Honghong Xu1, Xiaoqiang Ma4, Ping Xia2,3,5

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 157-176, 2023, DOI:10.32604/cmes.2023.025082

    Abstract Generation-based linguistic steganography is a popular research area of information hiding. The text generative steganographic method based on conditional probability coding is the direction that researchers have recently paid attention to. However, in the course of our experiment, we found that the secret information hiding in the text tends to destroy the statistical distribution characteristics of the original text, which indicates that this method has the problem of the obvious reduction of text quality when the embedding rate increases, and that the topic of generated texts is uncontrollable, so there is still room for improvement… More >

  • Open Access


    Improved Dual-image Quality with Reversible Data Hiding Using Translocation and Switching Strategy

    Chin-Feng Lee, Kuo-Chung Chan*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1551-1566, 2023, DOI:10.32604/csse.2023.026294

    Abstract Dual-image reversible data hiding (RDH) is a technique for hiding important messages. This technology can be used to safely deliver secret messages to the recipient through dual images in an open network without being easily noticed. The recipient of the image must receive the two stego-images before the secret message can be completely retrieved. Imperceptibility is one of the main advantages of data hiding technology; to increase the imperceptibility, the quality requirements of the stego-images are relatively important. A dual steganographic image RDH method, called a DS-CF scheme that can achieve a better steganographic image… More >

  • Open Access


    A Steganography Model Data Protection Method Based on Scrambling Encryption

    Xintao Duan1,*, Zhiqiang Shao1, Wenxin Wang1, En Zhang1, Dongli Yue1, Chuan Qin2, Haewoon Nam3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5363-5375, 2022, DOI:10.32604/cmc.2022.027807

    Abstract At present, the image steganography method based on CNN has achieved good results. The trained model and its parameters are of great value. Once leaked, the secret image will be exposed. To protect the security of steganographic network model parameters in the transmission process, an idea based on network model parameter scrambling is proposed in this paper. Firstly, the sender trains the steganography network and extraction network, encrypts the extraction network parameters with the key shared by the sender and the receiver, then sends the extraction network and parameters to the receiver through the public… More >

  • Open Access


    A Distributed Secret Sharing Method with QR Code Based on Information Hiding

    Pengcheng Jiang, Yu Xue*

    Journal of Cyber Security, Vol.3, No.4, pp. 217-225, 2021, DOI:10.32604/jcs.2021.026022

    Abstract QR codes are applied widely on the Internet and mobile devices in recent years. Its open standards and the characteristics of easy to generate lead to anyone can generate their QR code easily. Also, the QR code does not have the ability of hiding information, which leads to everyone can get access to read the content in any QR code, including those hiding some secret content in the bytes of QR code. Therefore, in recent years, information tampering and information leakage cases caused by poor security of two-dimensional code occur frequently, especially in the… More >

  • Open Access


    Pixel Based Steganography for Secure Information Hiding

    N. Shyla*, K. Kalimuthu

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 143-149, 2021, DOI:10.32604/jihpp.2021.026760

    Abstract The term “steganography” is derived from the Greek words steganos, which means “verified, concealed, or guaranteed”, and graphein, which means “writing”. The primary motivation for considering steganography is to prevent unapproved individuals from obtaining disguised data. With the ultimate goal of comprehending the fundamental inspiration driving the steganography procedures, there should be no significant change in the example report. The Least Significant Bit (LSB) system, which is one of the methodologies for concealing propelled picture data, is examined in this assessment. In this evaluation, another procedure for data stowing indefinitely is proposed with the ultimate More >

  • Open Access


    Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

    Khalid A. El Drandaly1, Walid Khedr1, Islam S. Mohamed1, Ayman Mohamed Mostafa2,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5253-5270, 2022, DOI:10.32604/cmc.2022.023684

    Abstract Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark… More >

  • Open Access


    Software Information Hiding Algorithm Based on Palette Icon of PE File

    Zuwei Tian1,*, Hengfu Yang1, Zhichen Gao2

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 133-142, 2022, DOI:10.32604/iasc.2022.024494

    Abstract PE (Portable executable) file is a standard format for executable file and is applied extensively. PE file has diversity, uncertainty of file size, complexity of file structure and singleness of file format, which make PE file easy to be a carrier of information hiding, especially for that of large hiding capacity. A novel software information hiding algorithm is proposed, which makes full use of display characteristics of palette icon of portable executable file. In this algorithm, the information is embedded into the transparent area of the icon by taking advantage of the redundant color items… More >

  • Open Access


    A QR Data Hiding Method Based on Redundant Region and BCH

    Ying Zhou*, Weiwei Luo

    Journal on Big Data, Vol.3, No.3, pp. 127-133, 2021, DOI:10.32604/jbd.2021.019236

    Abstract In recent years, QR code has been widely used in the Internet and mobile devices. It is based on open standards and easy to generate a code, which lead to that anyone can generate their own QR code. Because the QR code does not have the ability of information hiding, any device can access the content in QR code. Thus, hiding the secret data in QR code becomes a hot topic. Previously, the information hiding methods based on QR code all use the way of information hiding based on image, mostly using digital watermarking technology,… More >

  • Open Access


    A Robust Text Coverless Information Hiding Based on Multi-Index Method

    Lin Xiang1, Jiaohua Qin1,*, Xuyu Xiang1, Yun Tan1, Neal N. Xiong2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 899-914, 2021, DOI:10.32604/iasc.2021.017720

    Abstract Recently, researchers have shown that coverless information hiding technology can effectively resist the existing steganalysis tools. However, the robustness of existing coverless text information hiding methods is generally poor. To solve this problem, we propose a robust text coverless information hiding method based on multi-index. Firstly, the sender segment the secret information into several keywords. Secondly, we transform keywords into keyword IDs by the word index table and introduce a random increment factor to control. Then, search all texts containing the keyword ID in the big data text, and use the robust text search algorithm More >

Displaying 1-10 on page 1 of 21. Per Page