Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (70)
  • Open Access

    ARTICLE

    3D Multilayered Turtle Shell Models for Image Steganography

    Ji-Hwei Horng1, Juan Lin2,*, Yanjun Liu3, Chin-Chen Chang3,4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 879-906, 2020, DOI:10.32604/cmes.2020.09355

    Abstract By embedding secret data into cover images, image steganography can produce non-discriminable stego-images. The turtle shell model for data hiding is an excellent method that uses a reference matrix to make a good balance between image quality and embedding capacity. However, increasing the embedding capacity by extending the area of basic structures of the turtle shell model usually leads to severe degradation of image quality. In this research, we innovatively extend the basic structure of the turtle shell model into a three-dimensional (3D) space. Some intrinsic properties of the original turtle shell model are well preserved in the 3D version.… More >

  • Open Access

    ARTICLE

    Multiple Images Steganography of JPEG Images Based on Optimal Payload Distribution

    Yang Pei1,2, Xiangyang Luo1,2,*, Yi Zhang2, Liyan Zhu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 417-436, 2020, DOI:10.32604/cmes.2020.010636

    Abstract Multiple images steganography refers to hiding secret messages in multiple natural images to minimize the leakage of secret messages during transmission. Currently, the main multiple images steganography algorithms mainly distribute the payloads as sparsely as possible in multiple cover images to improve the detection error rate of stego images. In order to enable the payloads to be accurately and efficiently distributed in each cover image, this paper proposes a multiple images steganography for JPEG images based on optimal payload redistribution. Firstly, the algorithm uses the principle of dynamic programming to redistribute the payloads of the cover images to reduce the… More >

  • Open Access

    ARTICLE

    High Visual Quality Image Steganography Based on Encoder-Decoder Model

    Yan Wang*, Zhangjie Fu, Xingming Sun

    Journal of Cyber Security, Vol.2, No.3, pp. 115-121, 2020, DOI:10.32604/jcs.2020.012275

    Abstract Nowadays, with the popularization of network technology, more and more people are concerned about the problem of cyber security. Steganography, a technique dedicated to protecting peoples’ private data, has become a hot topic in the research field. However, there are still some problems in the current research. For example, the visual quality of dense images generated by some steganographic algorithms is not good enough; the security of the steganographic algorithm is not high enough, which makes it easy to be attacked by others. In this paper, we propose a novel high visual quality image steganographic neural network based on encoder-decoder… More >

  • Open Access

    ARTICLE

    A Novel Approach to Steganography: Enhanced Least Significant Bit Substitution Algorithm Integrated with Self-Determining Encryption Feature

    Resul Das1,∗, Muhammet Baykara1, Gurkan Tuna2

    Computer Systems Science and Engineering, Vol.34, No.1, pp. 23-32, 2019, DOI:10.32604/csse.2019.34.023

    Abstract One of the most well-known and used algorithms for Steganography is Least Significant Bit (LSB) substitution. Although LSB has several advantages such as simplicity, efficiency, and easy-to-do implementation, it has some distinct disadvantages such as it openness to miscellaneous attacks. In this study, we aim to improve the traditional LSB algorithm by eliminating its main disadvantage, being easy to detect, and this way propose an enhanced LSB algorithm called E-LSB. We mainly aim to minimize differences which are due to encryption and image hiding steps in LSB algorithm and make it more difficult to notice that some text has been… More >

  • Open Access

    ARTICLE

    Coverless Text Hiding Method Based on Improved Evaluation Index and One-Bit Embedding

    Ning Wu1,2, Yi Yang1,*, Lian Li1, Zhongliang Yang3, Poli Shang4, Weibo Ma5, Zhenru Liu5

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.3, pp. 1035-1048, 2020, DOI:10.32604/cmes.2020.010450

    Abstract In the field of information hiding, text is less redundant, which leads to less space to hide information and challenging work for researchers. Based on the Markov chain model, this paper proposes an improved evaluation index and onebit embedding coverless text steganography method. In the steganography process, this method did not simply take the transition probability as the optimization basis of the steganography model, but combined it with the sentence length in the corresponding nodes in the model to gauge sentence quality. Based on this, only two optimal conjunctions of the current words are retained in the method to generate… More >

  • Open Access

    ARTICLE

    Image Information Hiding Method Based on Image Compression and Deep Neural Network

    Xintao Duan1, *, Daidou Guo1, Chuan Qin2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.2, pp. 721-745, 2020, DOI:10.32604/cmes.2020.09463

    Abstract Image steganography is a technique that hides secret information into the cover image to protect information security. The current image steganography is mainly to embed a smaller secret image in an area such as a texture of a larger-sized cover image, which will cause the size of the secret image to be much smaller than the cover image. Therefore, the problem of small steganographic capacity needs to be solved urgently. This paper proposes a steganography framework that combines image compression. In this framework, the Vector Quantized Variational AutoEncoder (VQ-VAE) is used to achieve the compression of the secret image. The… More >

  • Open Access

    ARTICLE

    Privacy Protection for Medical Images Based on DenseNet and Coverless Steganography

    Yun Tan1, Jiaohua Qin1, *, Hao Tang2, Xuyu Xiang1, Ling Tan2, Neal N. Xiong3

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1797-1817, 2020, DOI:10.32604/cmc.2020.010802

    Abstract With the development of the internet of medical things (IoMT), the privacy protection problem has become more and more critical. In this paper, we propose a privacy protection scheme for medical images based on DenseNet and coverless steganography. For a given group of medical images of one patient, DenseNet is used to regroup the images based on feature similarity comparison. Then the mapping indexes can be constructed based on LBP feature and hash generation. After mapping the privacy information with the hash sequences, the corresponding mapped indexes of secret information will be packed together with the medical images group and… More >

  • Open Access

    ARTICLE

    Constructive Texture Steganography Based on Compression Mapping of Secret Messages

    Fengyong Li1, *, Zongliang Yu1, Chuan Qin2

    CMES-Computer Modeling in Engineering & Sciences, Vol.124, No.1, pp. 393-410, 2020, DOI:10.32604/cmes.2020.09452

    Abstract This paper proposes a new constructive texture synthesis steganographic scheme by compressing original secret messages. First, we divide the original message into multiple bit blocks, which are transferred to decimal values and compressed into small decimal values by recording their interval sign characters. Then, a candidate pattern is generated by combining the given source pattern and boundary extension algorithm. Furthermore, we segment the candidate pattern into multiple candidate patches and use affine transformation algorithm to locate secret positions on a blank canvas, which are used to hide the sign characters by mapping the candidate patches. Finally, we select the candidate… More >

  • Open Access

    ARTICLE

    Coverless Image Steganography Based on Image Segmentation

    Yuanjing Luo1, Jiaohua Qin1, *, Xuyu Xiang1, Yun Tan1, Zhibin He1, Neal N. Xiong2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1281-1295, 2020, DOI:10.32604/cmc.2020.010867

    Abstract To resist the risk of the stego-image being maliciously altered during transmission, we propose a coverless image steganography method based on image segmentation. Most existing coverless steganography methods are based on whole feature mapping, which has poor robustness when facing geometric attacks, because the contents in the image are easy to lost. To solve this problem, we use ResNet to extract semantic features, and segment the object areas from the image through Mask RCNN for information hiding. These selected object areas have ethical structural integrity and are not located in the visual center of the image, reducing the information loss… More >

  • Open Access

    ARTICLE

    A Novel Approach of Image Steganography for Secure Communication Based on LSB Substitution Technique

    Shahid Rahman1, Fahad Masood2, Wajid Ullah Khan2, Niamat Ullah1, Fazal Qudus Khan3, Georgios Tsaramirsis3, Sadeeq Jan4, *, Majid Ashraf5

    CMC-Computers, Materials & Continua, Vol.64, No.1, pp. 31-61, 2020, DOI:10.32604/cmc.2020.09186

    Abstract Steganography aims to hide the messages from unauthorized persons for various purposes, e.g., military correspondence, financial transaction data. Securing the data during transmission is of utmost importance these days. The confidentiality, integrity, and availability of the data are at risk because of the emerging technologies and complexity in software applications, and therefore, there is a need to secure such systems and data. There are various methodologies to deal with security issues when utilizing an open system like the Internet. This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems. We… More >

Displaying 41-50 on page 5 of 70. Per Page