W Lu, J Zhang, X Zhao, W Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Social networks are everywhere and currently transmitting very large messages. As a result, transmitting secret messages in such an environment is worth researching. However, the …
Malware distribution to the victim network is commonly performed through file attachments in phishing email or from the internet, when the victim interacts with the source of infection. To …
X Duan, B Li, Z Yin, X Zhang, B Luo - Expert Systems with Applications, 2023 - Elsevier
Transmitting images for communication on social networks has become routine, which is helpful for covert communication. The traditional steganography algorithm is unable to …
Y Zhang, X Luo, J Wang, Y Guo, F Liu - Information Sciences, 2021 - Elsevier
Currently, the demand for covert communication in open social networks brings new opportunities and challenges to existing image steganography technology in terms of …
C Yuan, H Wang, P He, J Luo, B Li - Multimedia Tools and Applications, 2022 - Springer
In recent years, the development of steganalysis based on convolutional neural networks (CNN) has brought new challenges to the security of image steganography. However, the …
J Yang, X Liao - Signal Processing: Image Communication, 2023 - Elsevier
Recent works with the technique of adversarial example have been bringing the possibility of effectively resisting the machine learning-based steganalyzers. Nevertheless, these …
W Tang, B Li, M Barni, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although significant progress has been achieved recently in automatic learning of steganographic cost, the existing methods designed for spatial images cannot be directly …
Z Wang, G Feng, L Shen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Existing cover selection methods for steganography mainly focus on embedding distortion of each image, but ignore the similarity between images. When the cover images are similar, a …
L Zhou, G Feng, L Shen, X Zhang - IEEE Signal Processing …, 2019 - ieeexplore.ieee.org
Steganography plays an important role in information hiding. With the development of steganalysis, traditional steganography faces more detection threat. It is necessary to …