… The covert communication technology based on steganographic labels mainly detects whether network packets contain stegantic headers, and determines the flow direction of packets …
… In particular,we aim to make steganographic behavior indistinguishable from regular super-resolution image processing behavior. The entire method can be divided into three modules:…
… Its typical algorithm reviews, application sce narios and benchmark are presented. The prospect of perceptual hashing algorithms and techniques is also discussed. Key words: …
吴国华, 龚礼春, 袁理锋, 姚晔 - Journal on Communication …, 2019 - infocomm-journal.com
… The research progress of Chinese text information hiding was reviewed. According to the clue of Chinese text information hiding, the existing algorithms were divided into three …
… Although the traditional image steganography used in some research has the advan⁃ tage of … a cover-image employing the image steganography based on generative adversarial net⁃ …
… A review of artificial intelligence techniques in image steganography domain[J].Journal of … A novel fault diagnosis technique for wind turbine gearbox[J]. Applied Soft Computing,2019,…
… of proposed method for five kinds of typical steganography methods, including LSB, SS, Jsteg, … A review on blind detection for image steganography[J]. Signal Processing, 2008, 88(9): …