Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Cover Enhancement Method for Audio Steganography Based on Universal Adversarial Perturbations with Sample Diversification

    Jiangchuan Li, Peisong He*, Jiayong Liu, Jie Luo, Qiang Xia

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4893-4915, 2023, DOI:10.32604/cmc.2023.036819

    Abstract Steganography techniques, such as audio steganography, have been widely used in covert communication. However, the deep neural network, especially the convolutional neural network (CNN), has greatly threatened the security of audio steganography. Besides, existing adversarial attacks-based countermeasures cannot provide general perturbation, and the transferability against unknown steganography detection methods is weak. This paper proposes a cover enhancement method for audio steganography based on universal adversarial perturbations with sample diversification to address these issues. Universal adversarial perturbation is constructed by iteratively optimizing adversarial perturbation, which applies adversarial attack techniques, such as Deepfool. Moreover, the sample diversification strategy is designed to improve… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A hidden message is first included… More >

  • Open Access

    ARTICLE

    Securing Technique Using Pattern-Based LSB Audio Steganography and Intensity-Based Visual Cryptography

    Pranati Rakshit1, Sreeparna Ganguly1, Souvik Pal2, Ayman A. Aly3, Dac-Nhuong Le4,5,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 1207-1224, 2021, DOI:10.32604/cmc.2021.014293

    Abstract With the increasing need of sensitive or secret data transmission through public network, security demands using cryptography and steganography are becoming a thirsty research area of last few years. These two techniques can be merged and provide better security which is nowadays extremely required. The proposed system provides a novel method of information security using the techniques of audio steganography combined with visual cryptography. In this system, we take a secret image and divide it into several subparts to make more than one incomprehensible sub-images using the method of visual cryptography. Each of the sub-images is then hidden within individual… More >

Displaying 1-10 on page 1 of 3. Per Page