Cover-separable Fixed Neural Network Steganography via Deep Generative Models
Abstract
References
Index Terms
- Cover-separable Fixed Neural Network Steganography via Deep Generative Models
Recommendations
Securing Fixed Neural Network Steganography
MM '23: Proceedings of the 31st ACM International Conference on MultimediaImage steganography is the art of concealing secret information in images in a way that is imperceptible to unauthorized parties. Recent advances show that is possible to use a fixed neural network (FNN) for secret embedding and extraction. Such fixed ...
Generative Steganography Network
MM '22: Proceedings of the 30th ACM International Conference on MultimediaSteganography usually modifies cover media to embed secret data. A new steganographic approach called generative steganography (GS) has emerged recently, in which stego images (images containing secret data) are generated from secret data directly ...
Cover Image Selection Technique for Secured LSB-based Image Steganography
ACAI '18: Proceedings of the 2018 International Conference on Algorithms, Computing and Artificial IntelligenceVarious researches in image steganography focusing on spatial domain specifically in the least Significant Bit (LSB) embedding method had been conducted to improve the embedding capacity while maintaining high imperceptibility. However, these ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Jianfei Cai,
- Mohan Kankanhalli,
- Balakrishnan Prabhakaran,
- Susanne Boll,
- Program Chairs:
- Ramanathan Subramanian,
- Liang Zheng,
- Vivek K. Singh,
- Pablo Cesar,
- Lexing Xie,
- Dong Xu
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 74Total Downloads
- Downloads (Last 12 months)74
- Downloads (Last 6 weeks)21
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in