[HTML][HTML] Chaotic medical image encryption method using attention mechanism fusion ResNet model

X Li, H Peng - Frontiers in Neuroscience, 2023 - frontiersin.org
Introduction With the rapid advancement of artificial intelligence (AI) technology, the
protection of patient medical image privacy and security has become a critical concern in …

IS-DGM: an improved steganography method based on a deep generative model and hyper logistic map encryption via social media networks

MA Hameed, M Hassaballah, T Qiao - Multimedia Systems, 2024 - Springer
The exchange of information through social networking sites has become a major risk due to
the possibility of obtaining millions of subscribers' data at any time without the right …

[HTML][HTML] Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion

F Tao, C Cao, H Li, B Zou, L Wang, J Sun - Applied Sciences, 2023 - mdpi.com
Deep steganography (DS), using neural networks to hide one image in another, has
performed well in terms of invisibility, embedding capacity, etc. Current steganalysis …

[HTML][HTML] Preface to the Special Issue on “Mathematical Methods for Computer Science”

Z Hua, Y Zhang - Mathematics, 2023 - mdpi.com
In the last few decades, the relationship between mathematics and algorithms has become
increasingly important and influential in computer science. The rapid advancements in …

Minimizing Distortion in Secret Image Retrieval: A Novel Solution to Combat Data Loss in Steganography

AYI Abushawish, M Baziyad, T Rabie… - 2023 15th International …, 2023 - ieeexplore.ieee.org
Steganography, the practice of concealing secret information within innocuous carriers,
exploits inherent data redundancies to ensure effective covert communication. However …

Image Steganography: Uncovering Hiding Image Using Deep Learning for Attention-Generative Adversarial Network

N Shilpa, Z Alassedi… - … on Mobile Networks …, 2023 - ieeexplore.ieee.org
Steganography is one of the most crucial role in the field of information hiding, which is the
technique to hiding a secrete image from ordinary file or message in order to avoiding the …

Предельные биполярные последовательности для робастного маркирования цифровых аудиосигналов по методу лоскута

МВ Гофман, АА Корниенко - Информатика и автоматизация, 2023 - mathnet.ru
Обеспечение устойчивости маркирования цифровых аудиосигналов в условиях
действия помех, различных преобразований и возможных атак является актуальной …