Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Coverless Image Steganography System Based on Maze Game Generation

    Al Hussien Seddik Saad1, Mohammed S. Reda2, Gamal M. Behery2, Ahmed A. El-harby2, Mohammed Baz3, Mohamed Abouhawwash4,5,*, Ahmed Ismail Ebada6

    Intelligent Automation & Soft Computing, Vol.38, No.2, pp. 125-138, 2023, DOI:10.32604/iasc.2023.032084

    Abstract The trend of digital information transformation has become a topic of interest. Many data are threatening; thus, protecting such data from attackers is considered an essential process. Recently, a new methodology for data concealing has been suggested by researchers called coverless steganography. Coverless steganography can be accomplished either by building an image database to match its image subblocks with the secret message to obtain the stego image or by generating an image. This paper proposes a coverless image steganography system based on pure image generation using secret message bits with a capacity higher than the other traditional systems. The system… More >

  • Open Access

    ARTICLE

    A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation

    Al-Hussien Seddik1, Mohammed Salah2, Gamal Behery2, Ahmed El-harby2, Ahmed Ismail Ebada2, Sokea Teng3, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5087-5103, 2023, DOI:10.32604/cmc.2023.035364

    Abstract The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This system consists of two components. The first component contains two processes, encryption process, and hiding process. The encryption… More >

Displaying 1-10 on page 1 of 2. Per Page