Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Sep 13, 2018 · This paper proposes an asymmetric model-based steganographic scheme (ASYMM), which embeds on a cover image with consideration of adjacent ...
Experimental results show that the proposed model-based steganographic scheme can rival or outperform the prior arts, and moreover, can provide a stable ...
A novel steganography scheme based on asymmetric embedding model. X Hu, H Chen, J Ni, W Su. International Conference on Cloud Computing and Security, 183-194 ...
Introducing an edge-based steganographic method which uses an edge detection algorithm to identify the edge areas of an image and then embeds the noise-like ...
The chaotic asymmetric steganography scheme (CAS) mainly has got three main steps namely, stego-matrix generation, embedding process and finally extraction.
The theoretical framework of the CCS-based steganographic scheme is given, in which pixels are divided into groups and secret data are embedded into each group.
A novel steganography scheme based on asymmetric embedding model. X Hu, H Chen, J Ni, W Su. International Conference on Cloud Computing and Security, 183-194 ...
Additionally, we introduce an edge-based steganography method to conceal the participants' shares in cover images. The proposed technique achieves higher visual ...
Sep 18, 2023 · We present a novel adversarial embedding-based steganography method ... However, using asymmetric embedding costs ... Using high-dimensional image ...
Su, “A novel steganography scheme based on asymmetric embedding model,” in Cloud Computing and Security. Springer International Publishing, 2018, pp. 183 ...