_ | steganalysis | _ |
3D | steganalysis | Using the Extended Local Feature Set |
Active | steganalysis | for interpolation-error based reversible data hiding |
Adaptive multi-teacher softened relational knowledge distillation framework for payload mismatch in image | steganalysis | |
Advanced Statistical | steganalysis | |
Aggregating Local and Global Text Features for Linguistic | steganalysis | |
anti- | steganalysis | adaptive steganography for HEVC video based on PU partition modes, An |
application of Sparse Code Shrinkage to image | steganalysis | based on supervised learning, An |
Binary Image | steganalysis | Based on Histogram of Structuring Elements |
Binary image | steganalysis | based on local texture pattern |
Binary image | steganalysis | based on pixel mesh Markov transition matrix |
Blind Image | steganalysis | Based on Run-Length Histogram Analysis |
Blind Image | steganalysis | Based on Statistical Analysis of Empirical Matrix |
Blind Linguistic | steganalysis | against Translation Based Steganography |
Blind Quantitative | steganalysis | Based on Feature Fusion and Gradient Boosting |
Block-based image | steganalysis | : Algorithm and performance evaluation |
BNS-CNN: A Blind Network | steganalysis | Model Based on Convolutional Neural Network in IPV6 Network |
Boosting Image | steganalysis | Under Universal Deep Learning Architecture Incorporating Ensemble Classification Strategy |
Category Attack for LSB | steganalysis | of JPEG Images |
CCNet: CNN model with channel attention and convolutional pooling mechanism for spatial image | steganalysis | |
CNN-based | steganalysis | and parametric adversarial embedding:A game-theoretic framework |
Comparison of DCT and Gabor Filters in Residual Extraction of CNN Based JPEG | steganalysis | |
comprehensive review of video | steganalysis | , A |
Content-Adaptive Residual for | steganalysis | |
Content-Adaptive | steganalysis | via Augmented Utilization of Selection-Channel Information |
Contribution-based feature transfer for JPEG mismatched | steganalysis | |
Convolutional Neural Network Based Text | steganalysis | |
Convolutional Neural Network for Larger JPEG Images | steganalysis | |
Convolutional neural network | steganalysis | 's application to steganography |
Cover-source Mismatch in Deep Spatial | steganalysis | |
Deep learning for real-time image | steganalysis | : a survey |
Deep Learning on Spatial Rich Model for | steganalysis | |
Deep Residual Multi-scale Convolutional Network for Spatial | steganalysis | , A |
Detection Based Defense Against Adversarial Examples From the | steganalysis | Point of View |
Digital image | steganalysis | : A survey on paradigm shift from machine learning to deep learning based techniques |
Digital video | steganalysis | toward spread spectrum data hiding |
Distribution-Preserving-Based Automatic Data Augmentation for Deep Image | steganalysis | |
Diversity-Based Cascade Filters for JPEG | steganalysis | |
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG | steganalysis | |
effective image | steganalysis | method based on neighborhood information of pixels, An |
Effects and solutions of Cover-Source Mismatch in image | steganalysis | |
Efficient binary image | steganalysis | based on ensemble neural network of multi-module |
Empirical Study of Steganography and | steganalysis | of Color Images in the JPEG Domain, An |
Ensemble of Classifiers Approach to | steganalysis | , An |
Ensemble of CNN and rich model for | steganalysis | |
Ensemble | steganalysis | Based on Deep Residual Network |
Ensemble SW image | steganalysis | : A low dimension method for LSBR detection |
Evaluation of Feature Selection Measures for | steganalysis | |
Extended Optimization Method of LSB | steganalysis | |
Fast and Efficient Text | steganalysis | Method, A |
Fast | steganalysis | Method for VoIP Streams |
Fast SwT-Based Deep | steganalysis | Network for Arbitrary-Sized Images |
Faster and transferable deep learning | steganalysis | on GPU |
Feature mining and pattern classification for | steganalysis | of LSB matching steganography in grayscale images |
Feature Passing Learning for Image | steganalysis | |
Features-Pooling Blind JPEG Image | steganalysis | |
Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti- | steganalysis | Based on Simulated Annealing Algorithm, A |
further study on | steganalysis | of LSB matching by calibration, A |
Fusion Based Blind Image | steganalysis | by Boosting Feature Selection |
Generalized transfer component analysis for mismatched JPEG | steganalysis | |
HEVC Video | steganalysis | Based on PU Maps and Multi-Scale Convolutional Residual Network |
HGA: Hierarchical Feature Extraction With Graph and Attention Mechanism for Linguistic | steganalysis | |
High-performance Linguistic | steganalysis | , Capacity Estimation and Steganographic Positioning |
Highly accurate real-time image | steganalysis | based on GPU |
Hybrid R-BILSTM-C Neural Network Based Text | steganalysis | , A |
Image Complexity and Feature Extraction for | steganalysis | of LSB Matching Steganography |
Image Hiding, Data Hiding, Steganography, | steganalysis | |
Image | steganalysis | Against Adversarial Steganography by Combining Confidence and Pixel Artifacts |
Image | steganalysis | Network Based on Dual-Attention Mechanism |
Image | steganalysis | with Binary Similarity Measures |
Image Steganography and | steganalysis | : Concepts and Practice |
Images | steganalysis | using GARCH model for feature selection |
Importance of Truncation Activation in Pre-Processing for Spatial and Jpeg Image | steganalysis | |
Improved JPEG Phase-Aware | steganalysis | Features Using Multiple Filter Sizes and Difference Images |
Improved | steganalysis | algorithm against motion vector based video steganography |
Improving Audio | steganalysis | Using Deep Residual Networks |
Improving spatial image adaptive | steganalysis | incorporating the embedding impact on the feature |
Intriguing Struggle of CNNs in JPEG | steganalysis | and the OneHot Solution, An |
ISTEGO100K: Large-scale Image | steganalysis | Dataset |
JPEG Image | steganalysis | Using Weight Allocation from Block Evaluation |
JPEG | steganalysis | Based on Local Dimension Estimation |
JPEG | steganalysis | With High-Dimensional Features and Bayesian Ensemble Classifier |
Learning and transferring representations for image | steganalysis | using convolutional neural network |
Lifelong Learning for Text | steganalysis | Based on Chronological Task Sequence |
Light Multiscale Conventional Neural Network for MP3 | steganalysis | |
Lightweight and Effective Deep Image | steganalysis | Network |
Linguistic | steganalysis | by Enhancing and Integrating Local and Global Features |
Linguistic | steganalysis | Merging Semantic and Statistical Features |
Linguistic | steganalysis | With Graph Neural Networks |
Local ternary pattern based on path integral for | steganalysis | |
LSSD: A Controlled Large JPEG Image Database for Deep-learning-based | steganalysis | into the Wild |
Mixing high-dimensional features for JPEG | steganalysis | with ensemble classifier |
Model based | steganalysis | |
Model-based Methods For Steganography And | steganalysis | |
Modern Trends in Steganography and | steganalysis | |
Motion vector-domain video | steganalysis | exploiting skipped macroblocks |
MRF Based LSB | steganalysis | : A New Measure of Steganography Capacity |
Multi-class Blind | steganalysis | Based on Image Run-Length Analysis |
Multi-class JPEG Image | steganalysis | by Ensemble Linear SVM Classifier |
Multi-class | steganalysis | for Jpeg stego algorithms |
Multiple linear regression for universal | steganalysis | of images |
New framework for unsupervised universal | steganalysis | via SRISP-aided outlier detection |
New Hybrid DCT and Contourlet Transform Based JPEG Image | steganalysis | Technique, A |
Noise Features for Image Tampering Detection and | steganalysis | |
Novel Convolutional Neural Network for Image | steganalysis | With Shared Normalization, A |
Novel Feature Selection Model for JPEG Image | steganalysis | , A |
novel | steganalysis | framework of heterogeneous images based on GMM clustering, A |
Novel | steganalysis | of Steghide Focused on High-Frequency Region of Audio Waveform, A |
On information hiding with incomplete information about | steganalysis | |
On | steganalysis | of random LSB embedding in continuous-tone images |
On the Performance of Wavelet Decomposition | steganalysis | with JSteg Steganography |
Optimized CNN with Point-wise Parametric Rectified Linear Unit for Spatial Image | steganalysis | |
Paired mini-batch training: A new deep network training for image forensics and | steganalysis | |
Passive spread-spectrum | steganalysis | |
posterior evaluation algorithm of | steganalysis | accuracy inspired by residual co-occurrence probability, A |
Quantitative | steganalysis | of binary images |
Quantitative | steganalysis | of spatial LSB based stego images using reduced instances and features |
Rate insensitive | steganalysis | of ±1 embedding in images |
Real-Time Text | steganalysis | Based on Multi-Stage Transfer Learning |
Reduction of Markov Extended Features in JPEG Image | steganalysis | |
Region based Image | steganalysis | using Artificial Bee Colony |
Reliable JPEG | steganalysis | based on multi-directional correlations |
Reliable Pooled | steganalysis | Using Fine-Grained Parameter Estimation and Hypothesis Testing |
ReST-Net: Diverse Activation Modules and Parallel Subnets-Based CNN for Spatial Image | steganalysis | |
Rethinking the high capacity 3D steganography: Increasing its resistance to | steganalysis | |
RLS-DTS: Reinforcement-Learning Linguistic | steganalysis | in Distribution-Transformed Scenario |
Robust | steganalysis | based on training set construction and ensemble classifiers weighting |
Segmentation Based | steganalysis | of Spatial Images Using Local Linear Transform |
Selection of Rich Model | steganalysis | Features Based on Decision Rough Set alpha-Positive Region Reduction |
Selection of Robust and Relevant Features for 3-D | steganalysis | |
Selection of robust features for the Cover Source Mismatch problem in 3D | steganalysis | |
Selective Ensemble Classification of Image | steganalysis | Via Deep Q Network |
SeSy: Linguistic | steganalysis | Framework Integrating Semantic and Syntactic Features |
Small-Scale Linguistic | steganalysis | for Multi-Concealed Scenarios |
SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image | steganalysis | |
SNRCN2: | steganalysis | noise residuals based CNN for source social network identification of digital images |
Spatial | steganalysis | Using Contrast of Residuals |
Spatio-Temporal Rich Model-Based Video | steganalysis | on Cross Sections of Motion Vector Planes |
Statistical Model of Quantized DCT Coefficients: Application in the | steganalysis | of Jsteg Algorithm |
Statistical Moments Based Universal | steganalysis | using JPEG 2-D Array and 2-D Characteristic Function |
| steganalysis | and payload estimation of embedding in pixel differences using neural networks |
| steganalysis | Based on Awareness of Selection-Channel and Deep Learning |
| steganalysis | Based on Bayesion Network and Genetic Algorithm |
| steganalysis | Based on Difference Image |
| steganalysis | Based on Double JPEG Compression |
| steganalysis | by ensemble classifiers with boosting by regression, and post-selection of features |
| steganalysis | Feature Selection With Multidimensional Evaluation and Dynamic Threshold Allocation |
| steganalysis | for Text, Documents |
| steganalysis | in the Presence of Weak Cryptography and Encoding |
| steganalysis | of Compressed Speech Based on Markov and Entropy |
| steganalysis | of content-adaptive binary image data hiding |
| steganalysis | of data hiding in binary images |
| steganalysis | of Enhanced BPCS Steganography Using the Hilbert-Huang Transform Based Sequential Analysis |
| steganalysis | of JPEG images using enhanced neighbouring joint density features |
| steganalysis | of JPEG Images with Joint Transform Features |
| steganalysis | of JPEG2000 Lazy-Mode Steganography using the Hilbert-Huang Transform Based Sequential Analysis |
| steganalysis | of Jsteg algorithm based on a novel statistical model of quantized DCT coefficients |
| steganalysis | of LSB Greedy Embedding Algorithm for JPEG Images using Coefficient Symmetry |
| steganalysis | of LSB matching based on local variance histogram |
| steganalysis | of LSB Matching Based on the Statistical Analysis of Empirical Matrix |
| steganalysis | of LSB matching in grayscale images |
| steganalysis | of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions |
| steganalysis | of Multi Bit Plane Image Steganography |
| steganalysis | of Multiple-Base Notational System Steganography |
| steganalysis | of Plus/Minus-1 Embedding using Lossless Image Compression |
| steganalysis | of quantization index modulation data hiding |
| steganalysis | Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame, A |
| steganalysis | Using High-Dimensional Features Derived from Co-occurrence Matrix and Class-Wise Non-Principal Components Analysis (CNPCA) |
| steganalysis | using image quality metrics |
| steganalysis | using Noise Variance Estimation |
| steganalysis | Versus Splicing Detection |
Steganographic Method for Digital Images Robust to RS | steganalysis | , A |
Steganographic Security Analysis From Side Channel | steganalysis | and Its Complementary Attacks |
StegoHunter: | steganalysis | of LSB Embedded Images Based on Stego-Sensitive Threshold Close Color Pair Signature |
Structural Design of Convolutional Neural Networks for | steganalysis | |
Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in | steganalysis | , A |
Tackling the Cover Source Mismatch Problem in Audio | steganalysis | With Unsupervised Domain Adaptation |
Targeted | steganalysis | of adaptive pixel-value differencing steganography |
Targeted | steganalysis | of Edge Adaptive Image Steganography Based on LSB Matching Revisited Using B-Spline Fitting |
Towards blind detection of low-rate spatial embedding in image | steganalysis | |
Transfer subspace learning based on structure preservation for JPEG image mismatched | steganalysis | |
Transferable heterogeneous feature subspace learning for JPEG mismatched | steganalysis | |
TS-RNN: Text | steganalysis | Based on Recurrent Neural Networks |
Unbalanced JPEG image | steganalysis | via multiview data match |
Universal JPEG | steganalysis | based on microscopic and macroscopic calibration |
Universal JPEG | steganalysis | in the Compressed Frequency Domain |
Universal Mismatched | steganalysis | Equipped With Progressive Intermediate Domains |
Universal spatial feature set for video | steganalysis | |
Universal | steganalysis | of spatial content-independent and content-adaptive steganographic algorithms using normalized feature derived from empirical mode decomposed components |
Universal | steganalysis | Using Features Derived from the Differential Image Histogram in Frequency Domain, A |
Unsupervised Image | steganalysis | Method Using Self-Learning Ensemble Discriminant Clustering |
Variable Multi-dimensional Co-occurrence for | steganalysis | |
Video | steganalysis | based on the constraints of motion vectors |
Video | steganalysis | Exploiting Motion Vector Reversion-Based Features |
Wavelet Domain | steganalysis | Based on Predictability Analysis and Magnitude Prediction |
194 for steganalysis
_ | steganographic | _ |
Adaptive lossless | steganographic | scheme with centralized difference expansion |
adaptive | steganographic | method based on the measurement of just noticeable distortion profile, An |
adaptive | steganographic | scheme for H.264/AVC video with distortion optimization, An |
Advanced Least-Significant-Bit Embedding Scheme for | steganographic | Encoding, An |
ARES: On Adversarial Robustness Enhancement for Image | steganographic | Cost Learning |
Automatic | steganographic | Distortion Learning Using a Generative Adversarial Network |
Blind Iterative Recovery of Spread-Spectrum | steganographic | Messages |
Clustering | steganographic | Modification Directions for Color Components |
Coding Efficiency Preserving Steganography Based on HEVC | steganographic | Channel Model |
Cover Selection for | steganographic | Embedding |
Deep neural networks for efficient | steganographic | payload location |
Derivative-Based | steganographic | Distortion and its Non-additive Extensions for Audio |
Doc-Trace: Tracing Secret Documents in Cloud Computing via | steganographic | Marking |
Effect of saturated pixels on security of | steganographic | schemes for digital images |
efficient | steganographic | technique based on chaotic maps and adpative PPM embedding, An |
Estimating | steganographic | Capacity for Odd-Even Based Embedding and its Use in Individual Compensation |
Fundamental Limits Of | steganographic | Capacity For Multivariate-Quantized-Gaussian-Distributed Multimedia |
Generating JPEG | steganographic | Adversarial Example via Segmented Adversarial Embedding |
HCISNet: Higher-capacity invisible image | steganographic | network |
High Capacity HEVC | steganographic | Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks, A |
High capacity image | steganographic | model |
High Capacity | steganographic | Algorithm in Color Images, A |
High Payload VQ | steganographic | Method for Binary Images, A |
High Quality Perceptual | steganographic | Techniques |
High-capacity coverless image | steganographic | scheme based on image synthesis |
High-performance Linguistic Steganalysis, Capacity Estimation and | steganographic | Positioning |
High-performance | steganographic | Coding Based on Sub-polarized Channel |
How quantization based schemes can be used in image | steganographic | context |
Identification of Multiple Image | steganographic | Methods Using Hierarchical ResNets |
Image | steganographic | scheme based on pixel-value differencing and LSB replacement methods |
Inpainting-Assisted Reversible | steganographic | Scheme Using a Histogram Shifting Mechanism, An |
Joint Cover-Selection and Payload-Allocation by | steganographic | Distortion Optimization |
Medical image | steganographic | algorithm via modified LSB method and chaotic map |
Motion Vector-based | steganographic | Algorithm for HEVC with MTB Mapping Strategy, A |
Multi-Channel HEVC Steganography by Minimizing IPM | steganographic | Distortions |
New adaptive | steganographic | method using least significant-bit substitution and pixel-value differencing |
New JPEG | steganographic | Scheme with High Security Performance |
new | steganographic | method for color and grayscale image hiding, A |
new | steganographic | scheme based on vector quantisation and search-order coding, A |
novel natural language | steganographic | framework based on image description neural network, A |
Novel | steganographic | Algorithm Resisting Targeted Steganalytic Attacks on LSB Matching, A |
novel | steganographic | method using 8-neighboring PVD (8nPVD) and LSB substitution, A |
Novel Video | steganographic | Scheme Incorporating the Consistency Degree of Motion Vectors, A |
On Security Notions of | steganographic | Systems |
Palette-Based Image | steganographic | Method Using Colour Quantisation, A |
Reversible | steganographic | Method with High Payload for JPEG Images |
reversible | steganographic | scheme for VQ indices based on locally adaptive coding, A |
Second-order | steganographic | method based on adaptive reference matrix |
Secure Blind Image | steganographic | Technique Using Discrete Fourier Transformation |
Secure | steganographic | Scheme against Statistical Analyses, A |
| steganographic | Authentication Method for Electronic IDs |
| steganographic | Distortion Function for Enhanced Images |
| steganographic | Greedy Algorithms for Data Hiding Based on Differences Under SMVQ |
| steganographic | Method for Digital Images Robust to RS Steganalysis, A |
| steganographic | method for digital images using side match, A |
| steganographic | method for digital images with four-pixel differencing and modified LSB substitution, A |
| steganographic | method for images by pixel-value differencing, A |
| steganographic | Scheme For Gray-level Image Using Pixel Neighborhood And LSB Substitution |
| steganographic | Scheme for VQ Compressed Images Using Progressive Exponential Clustering |
| steganographic | Scheme Using a Block Cipher |
| steganographic | Security Analysis From Side Channel Steganalysis and Its Complementary Attacks |
| steganographic | universal adversarial perturbations |
Universal steganalysis of spatial content-independent and content-adaptive | steganographic | algorithms using normalized feature derived from empirical mode decomposed components |
63 for steganographic
_ | steganography | _ |
ACGIS: Adversarial Cover Generator for Image | steganography | with Noise Residuals Features-Preserving |
Adaptive Audio | steganography | Based on Advanced Audio Coding and Syndrome-Trellis Coding |
Adaptive Double-Layered Embedding Scheme for MP3 | steganography | , An |
Adaptive HEVC Video | steganography | With High Performance Based on Attention-Net and PU Partition Modes |
Adaptive MP3 | steganography | Using Equal Length Entropy Codes Substitution |
adaptive scheme for compressed video | steganography | using temporal and spatial features of the video signal, An |
Adaptive | steganography | Using 2D Gabor Filters and Ensemble Classifiers |
Adaptive Video | steganography | Based on Intra-prediction Mode and Cost Assignment, An |
Adversarial | steganography | based on sparse cover enhancement |
ALiSa: Acrostic Linguistic | steganography | Based on BERT and Gibbs Sampling |
Analysis of LSB Based Image | steganography | Techniques |
Analysis of the Scalability of a Deep-learning Network for | steganography | into the Wild |
anisotropic reference matrix for image | steganography | , An |
Anti-Rounding Image | steganography | With Separable Fine-Tuned Network |
anti-steganalysis adaptive | steganography | for HEVC video based on PU partition modes, An |
Application of bit-plane decomposition | steganography | to JPEG2000 encoded images |
Application of bit-plane decomposition | steganography | to wavelet encoded images |
Application of BPCS | steganography | to wavelet compressed video |
Application of QIM with Dead Zone for Histogram Preserving JPEG | steganography | |
Attack LSB Matching | steganography | by Counting Alteration Rate of the Number of Neighbourhood Gray Levels |
Attack on JPEG2000 | steganography | Using LRCA |
attack to BPCS- | steganography | using complexity histogram and countermeasure, An |
Backdoor Attacks against Deep Neural Networks by Personalized Audio | steganography | |
Batch | steganography | via Generative Network |
BBC++: Enhanced Block Boundary Continuity on Defining Non-Additive Distortion for JPEG | steganography | |
Binary image | steganography | based on joint distortion measurement |
Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using | steganography | , encryption and matching |
Bitspotting: Detecting Optimal Adaptive | steganography | |
Blind Linguistic Steganalysis against Translation Based | steganography | |
BPCS | steganography | using EZW lossy compressed images |
Broadcasting | steganography | in the Blockchain |
Capacity Result for Batch | steganography | , A |
CEC: Cluster Embedding Coding for H.264 | steganography | |
Centralized Error Distribution-Preserving Adaptive | steganography | for HEVC |
Chaos-based Video | steganography | Method in Discrete Cosine Transform Domain |
Chronological Gazelle Optimization with Deep Learning-Based pixel prediction for video | steganography | in H.264 video for defence applications |
Coding Efficiency Preserving | steganography | Based on HEVC Steganographic Channel Model |
Colour image | steganography | method based on sparse representation |
Comments on | steganography | Using Reversible Texture Synthesis |
Comprehensive survey of 3D image | steganography | techniques |
Constructing Immune Cover for Secure | steganography | Based on an Artificial Immune System Approach |
Constructing Immunized Stego-Image for Secure | steganography | via Artificial Immune System |
Content-Aware Robust JPEG | steganography | for Lossy Channels Using LPCNet |
Contribution of neural networks in image | steganography | , watermarking and encryption |
Controversial pixel prior rule for JPEG adaptive | steganography | |
Convolutional neural network steganalysis's application to | steganography | |
Cost Reassignment for Improving Security of Adaptive | steganography | Using an Artificial Immune System |
Coverless Image | steganography | Based on Multi-Object Recognition |
CPG-LS: Causal Perception Guided Linguistic | steganography | |
Cross-Modal Text | steganography | Against Synonym Substitution-Based Text Attack |
CSIS: Compressed sensing-based enhanced-embedding capacity image | steganography | scheme |
Data Hiding, | steganography | , Adversarial Networks, Convolutional Networks, Deep Learning |
Data Hiding, | steganography | , LSB, Least Significant Bit |
Data Hiding, | steganography | , Pixel Difference |
Data Hiding, | steganography | , Random Grids, Random Dots |
Decomposing Joint Distortion for Adaptive | steganography | |
Deep Cross-Modal | steganography | Using Neural Representations |
Designing Non-additive Distortions for JPEG | steganography | Based on Blocking Artifacts Reduction |
Detecting Multiple | steganography | Methods in Speech Streams Using Multi-Encoder Network |
Detecting | steganography | in JPEG Images Recompressed With the Same Quantization Matrix |
Detection of LSB matching | steganography | based on distribution of pixel differences in natural images |
Detection of LSB matching | steganography | based on the Laplacian model of pixel difference distributions |
Detection of LSB Matching | steganography | in Decompressed Images |
Detection of ±1 LSB | steganography | based on the amplitude of histogram local extrema |
Determining Achievable Rates for Secure, Zero Divergence, | steganography | |
Diffusion-based Image Compression in | steganography | |
Digital Watermarking and | steganography | |
Digital Watermarking and | steganography | : Fundamentals and Techniques |
Distortion Design for Secure Adaptive 3-D Mesh | steganography | |
Distortion Function for Spatial Image | steganography | Based on the Polarity of Embedding Change |
Dynamical running coding in digital | steganography | |
ECG | steganography | based on tunable Q-factor wavelet transform and singular value decomposition |
Efficient halftone image | steganography | based on dispersion degree optimization |
Efficient Hybrid | steganography | Method Based on Edge Adaptive and Tree Based Parity Check, An |
Efficient image | steganography | using graph signal processing |
Efficient JPEG | steganography | Using Domain Transformation of Embedding Entropy |
efficient | steganography | method based on reducing changes, An |
Embedding Strategy for Batch Adaptive | steganography | |
Empirical Study of | steganography | and Steganalysis of Color Images in the JPEG Domain, An |
End-to-End Trained CNN Encoder-Decoder Networks for Image | steganography | |
Enhancing reliability and efficiency for real-time robust adaptive | steganography | using cyclic redundancy check codes |
Enhancing | steganography | in Digital Images |
Ensemble Stego Selection for Enhancing Image | steganography | |
Evaluation of a Zero-Watermarking-Type | steganography | |
Evasion Attack | steganography | : Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application |
Exploring | steganography | : Seeing the Unseen |
Fast and Secure | steganography | Based on J-UNIWARD |
Feature mining and pattern classification for steganalysis of LSB matching | steganography | in grayscale images |
Focus on Content not Noise: Improving Image Generation for Nuclei Segmentation by Suppressing | steganography | in CycleGAN |
Framework of Enhancing Image | steganography | With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm, A |
GAN-based | steganography | with the Concatenation of Multiple Feature Maps |
GAN-TSTEGA: Text | steganography | Based on Generative Adversarial Networks |
Gaussian Model for 3D Mesh | steganography | |
Gradually Enhanced Adversarial Perturbations on Color Pixel Vectors for Image | steganography | |
Halftone Image | steganography | with Distortion Measurement Based on Structural Similarity |
Halftone Images, Compressed Images: Image Hiding, Data Hiding, | steganography | |
Hierarchical | steganography | using novel optimum quantization technique |
High capacity and secure digital | steganography | to palette-based images |
high payload | steganography | mechanism based on wavelet packet transformation and neutrosophic set, A |
High performance image | steganography | integrating IWT and Hamming code within secret sharing |
High-capacity Adaptive | steganography | Based on Transform Coefficient for HEVC |
High-Capacity | steganography | Scheme for JPEG2000 Baseline System, A |
High-capacity | steganography | using a shared colour palette |
High-payload image | steganography | using two-way block matching |
High-Performance CNN-Applied HEVC | steganography | Based on Diamond-Coded PU Partition Modes, A |
High-performance JPEG | steganography | using complementary embedding strategy |
High-performance JPEG | steganography | using quantization index modulation in DCT domain |
Highly Transparent | steganography | Scheme of Speech Signals into Color Images Using Quantization Index Modulation |
HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image | steganography | |
Image Complexity and Feature Extraction for Steganalysis of LSB Matching | steganography | |
Image Disentanglement Autoencoder for | steganography | without Embedding |
Image Hiding, Data Hiding, | steganography | , Steganalysis |
Image Steganalysis Against Adversarial | steganography | by Combining Confidence and Pixel Artifacts |
Image | steganography | and Steganalysis: Concepts and Practice |
Image | steganography | in DWT domain using double-stegging with RSA encryption |
Image | steganography | in spatial domain: A survey |
Image | steganography | Using an Eight-element Neighborhood Gaussian Markov Random Field Model |
Image | steganography | using Spread Spectrum Techniques |
Image | steganography | With Symmetric Embedding Using Gaussian Markov Random Field Model |
Improved Algorithm of Edge Adaptive Image | steganography | Based on LSB Matching Revisited Algorithm |
Improved LSB image | steganography | with high imperceptibility based on cover-stego matching |
Improved Matrix Encoding Scheme for JPEG | steganography | , An |
Improved payload location for LSB matching | steganography | |
Improved steganalysis algorithm against motion vector based video | steganography | |
Improving Cost Learning for JPEG | steganography | by Exploiting JPEG Domain Knowledge |
Improving Text-image Matching with Adversarial Learning and Circle Loss for Multi-modal | steganography | |
Improving the Embedding Strategy for Batch Adaptive | steganography | |
Improving the Robustness of JPEG | steganography | With Robustness Cost |
Internet of things assisted public security management platform for urban transportation using hybridised cryptographic-integrated | steganography | |
Introducing AV1 Codec-Level Video | steganography | |
Inverse Interpolation and Its Application in Robust Image | steganography | |
Invertible secret image sharing with | steganography | |
Invertible secret image sharing with | steganography | and authentication for AMBTC compressed images |
Invisible Semi-Fragile Watermarking and | steganography | of Digital Videos for Content Authentication and Data Hiding |
Is Image | steganography | Natural? |
iSCMIS:Spatial-Channel Attention Based Deep Invertible Network for Multi-Image | steganography | |
iterative method of palette-based image | steganography | , An |
Joint adjustment image | steganography | networks |
JPEG | steganography | With Content Similarity Evaluation |
JPEG | steganography | With Estimated Side-Information |
K out of N Secret Sharing Scheme for Multiple Color Images with | steganography | and Authentication |
Large-Capacity and Flexible Video | steganography | via Invertible Neural Network |
Large-capacity Image | steganography | Based on Invertible Neural Networks |
Light Field Messaging With Deep Photographic | steganography | |
Linguistic Generative | steganography | With Enhanced Cognitive-Imperceptibility |
Linguistic | steganography | : From Symbolic Space to Semantic Space |
Linguistic | steganography | : Hiding Information in Syntax Space |
Lip biometric template security framework using spatial | steganography | |
Lossless 3D | steganography | based on MST and connectivity modification |
LSB | steganography | with usage of Mojette Transform for secret image scrambling |
LSB-Based | steganography | Using Reflected Gray Code |
Luminance quasi-preserving color quantization for digital | steganography | to palette-based images |
Matrix embedding in | steganography | with binary Reed-Muller codes |
Medical JPEG image | steganography | method according to the distortion reduction criterion based on an imperialist competitive algorithm |
Method to Improve the Stego-Image Quality for Palette-Based Image | steganography | , A |
Minimizing the Statistical Impact of LSB | steganography | |
Model-based Methods For | steganography | And Steganalysis |
Model-Based | steganography | |
Modern Trends in | steganography | and Steganalysis |
Motion vector modification distortion analysis-based payload allocation for video | steganography | |
MRF Based LSB Steganalysis: A New Measure of | steganography | Capacity |
Multi Bit Plane Image | steganography | |
Multi-Channel HEVC | steganography | by Minimizing IPM Steganographic Distortions |
Multi-modal | steganography | Based on Semantic Relevancy |
Multi-round dynamic swap optimisation for table-based | steganography | |
Multibit Assignment | steganography | in Palette Images |
Multibit Embedding Algorithm for | steganography | of Palette-Based Images |
Multichannel | steganography | in Digital Images for Multiple Receivers |
Multiple Robustness Enhancements for Image Adaptive | steganography | in Lossy Channels |
Multitask Identity-Aware Image | steganography | via Minimax Optimization |
New Approach for Reducing Embedding Noise in Multiple Bit Plane | steganography | , A |
new cost function for spatial image | steganography | , A |
New Distortion Function Design for JPEG | steganography | Using the Generalized Uniform Embedding Strategy, A |
New Image | steganography | via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation |
New Payload Partition Strategy in Color Image | steganography | , A |
New Steganalytic Approach for AMR | steganography | Based on Block-wise of Pulse Position Distribution and Neighboring Joint Density |
New Steganalytic Features for Spatial Image | steganography | Based on Non-negative Matrix Factorization |
New | steganography | Based on L2 Technic, A |
News Image | steganography | : A Novel Architecture Facilitates the Fake News Identification |
Non-Degraded Adaptive HEVC | steganography | by Advanced Motion Vector Prediction |
Novel Approach for JPEG | steganography | , A |
Novel Approach to | steganography | in High- Dynamic-Range Images, A |
novel haze image | steganography | method via cover-source switching, A |
novel secret image sharing with | steganography | scheme utilizing Optimal Asymmetric Encryption Padding and Information Dispersal Algorithms, A |
On estimation of secret message length in jsteg-like | steganography | |
On Security Enhancement of | steganography | via Generative Adversarial Image |
On the Performance of Wavelet Decomposition Steganalysis with JSteg | steganography | |
On the Sharing-based Model of | steganography | |
One-third probability embedding: a new 1 histogram compensating image least significant bit | steganography | scheme |
Optical Video Cryptosystem with Adaptive | steganography | , An |
Optimal Signature Design for Spread-Spectrum | steganography | |
Optimization Approach to the TWPVD Method for Digital Image | steganography | , An |
Payload Scaling for Adaptive | steganography | : An Empirical Study |
Payload-Independent Direct Cost Learning for Image | steganography | |
Pitch Delay Based Adaptive | steganography | for AMR Speech Stream |
Pixel Prediction-Based Image | steganography | Using Crow Search Algorithm-Based Deep Belief Network Approach |
PNG-Stega: Progressive Non-Autoregressive Generative Linguistic | steganography | |
Portable real-time DCT-based | steganography | using OpenCL |
Practical Cover Selection for | steganography | |
Prediction Model Based Approach to Open Space | steganography | Detection in HTML WebPages, A |
Provably Secure Generative | steganography | Based on Autoregressive Model |
Provably Secure Robust Image | steganography | |
Provably Secure | steganography | : Achieving Zero K-L Divergence using Statistical Restoration |
Quantum image scaling with applications to image | steganography | and fusion |
Research on image | steganography | analysis based on deep learning |
Research on reversible image | steganography | of encrypted image based on image interpolation and difference histogram shift |
Rethinking the high capacity 3D | steganography | : Increasing its resistance to steganalysis |
Reversibility-oriented secret image sharing mechanism with | steganography | and authentication based on code division multiplexing |
Reversible Acoustic | steganography | for Integrity Verification, A |
Reversible adversarial | steganography | for security enhancement |
Reversible Data Hiding for JPEG, | steganography | |
Reversible data hiding in encrypted images for coding channel based on adaptive | steganography | |
Reversible Data Hiding, | steganography | |
RGB Color Image | steganography | Scheme by Binary Lower Triangular Matrix, An |
Robust Adaptive | steganography | Based on Adaptive STC-ECC |
Robust Coverless Image | steganography | Based on an End-to-End Hash Generation Model, A |
Robust Coverless Image | steganography | Based on DCT and LDA Topic Classification |
Robust Coverless Image | steganography | Based on Neglected Coverless Image Dataset Construction |
Robust Coverless | steganography | Based on Generative Adversarial Networks and Gradient Descent Approximation, A |
Robust Coverless | steganography | Scheme Using Camouflage Image, A |
Robust Coverless Video | steganography | Based on the Similarity of Inter-Frames, A |
Robust Invertible Image | steganography | |
Robust | steganography | for High Quality Images |
RoSteALS: Robust | steganography | using Autoencoder Latent Space |
Saliency map based image | steganography | |
Secret image sharing based on cellular automata and | steganography | |
Secret Key-Based Image | steganography | in Spatial Domain |
Secure and Disambiguating Approach for Generative Linguistic | steganography | , A |
Secure Binary Image | steganography | Based on Fused Distortion Measurement |
Secure Binary Image | steganography | With Distortion Measurement Based on Prediction |
Secure Halftone Image | steganography | Based on Feature Space and Layer Embedding |
Secure JPEG | steganography | by LSB+ matching and multi-band embedding |
Secure Robust JPEG | steganography | Based on AutoEncoder With Adaptive BCH Encoding |
Security Analysis on Spatial +/- 1 | steganography | for JPEG Decompressed Images |
Seek-and-Hide: Adversarial | steganography | via Deep Reinforcement Learning |
Self-Contained Stylization via | steganography | for Reverse and Serial Style Transfer |
Shortening the Cover for Fast JPEG | steganography | |
simple technique for estimating message lengths for additive noise | steganography | , A |
SINR, bit error rate, and shannon capacity optimized spread-spectrum | steganography | |
Spatial Image | steganography | Method Based on Nonnegative Matrix Factorization, A |
Spread Spectrum Image | steganography | |
Statistical detection of Jsteg | steganography | using hypothesis testing theory |
Statistical Restoration for Robust and Secure | steganography | |
Steganalysis of Enhanced BPCS | steganography | Using the Hilbert-Huang Transform Based Sequential Analysis |
Steganalysis of JPEG2000 Lazy-Mode | steganography | using the Hilbert-Huang Transform Based Sequential Analysis |
Steganalysis of Multi Bit Plane Image | steganography | |
Steganalysis of Multiple-Base Notational System | steganography | |
Steganalytic feature based adversarial embedding for adaptive JPEG | steganography | |
| steganography | Based on Adaptive Pixel-Value Differencing Scheme Revisited |
| steganography | Based on Grayscale Images Using (5, 3) Hamming Code |
| steganography | Based on High-Dimensional Reference Table |
| steganography | Development Offers Promise |
| steganography | for a Low Bit-rate Wavelet Based Image Coder |
| steganography | using a 3-player game |
| steganography | using multiple-base notational system and human vision sensitivity |
| steganography | Using Reversible Texture Synthesis |
| steganography | using Sensor Noise and Linear Prediction Synthesis Filter |
| steganography | with Hash |
Stego-key-based image | steganography | scheme using edge detector and modulus function |
Step Towards Practical | steganography | Systems, A |
Study on Visual Attack to BPCS- | steganography | and Countermeasure, A |
Surveys, Image Hiding, Data Hiding, | steganography | |
Targeted attack and security enhancement on texture synthesis based | steganography | |
Targeted steganalysis of adaptive pixel-value differencing | steganography | |
Targeted Steganalysis of Edge Adaptive Image | steganography | Based on LSB Matching Revisited Using B-Spline Fitting |
Ternary Data Hiding Technique for JPEG | steganography | |
THInImg: Cross-modal | steganography | for Presenting Talking Heads in Images |
Toward high imperceptibility deep JPEG | steganography | based on sparse adversarial attack |
Towards Robust Image | steganography | |
Trends in | steganography | |
Two-Description Image Coding With | steganography | |
Uniform Embedding for Efficient | steganography | of H.264 Video |
Upward Robust | steganography | Based on Overflow Alleviation |
Variable Rate Syndrome-trellis Codes for | steganography | on Bursty Channels |
Video Data Hiding, Data Hiding in Video, Video | steganography | |
Video Error Correction Using | steganography | |
Vulnerability of pixel-value differencing | steganography | to histogram analysis and modification for enhanced security |
277 for steganography