2022
DOI: 10.3390/e24091203
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Steganography Network for Concealing and Protecting Secret Image Data

Abstract: The development of Internet technology has provided great convenience for data transmission and sharing, but it also brings serious security problems that are related to data protection. As is detailed in this paper, an enhanced steganography network was designed to protect secret image data that contains private or confidential information; this network consists of a concealing network and a revealing network in order to achieve image embedding and recovery separately. To reduce the system’s computation compl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…However, due to the absence of a discriminator within the framework, the enhancement in performance was not markedly evident. Some researchers introduce the attention mechanism into the field of deep information hiding [10,[22][23][24], and promising results have been achieved. Tan et al [23].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, due to the absence of a discriminator within the framework, the enhancement in performance was not markedly evident. Some researchers introduce the attention mechanism into the field of deep information hiding [10,[22][23][24], and promising results have been achieved. Tan et al [23].…”
Section: Related Workmentioning
confidence: 99%
“…In order to verify the necessity of this study, we do some comparative experiments to verify that the proposed algorithm is more suitable for our RSI security distribution task from different perspectives. Specifically, we selected six deep information hiding algorithms [8,11,12,20,24,35] that are close to the idea and method of the algorithm in this paper. They only completed the process of hiding pictures in pictures, without special design for RSI.…”
Section: Quantitative Comparisonmentioning
confidence: 99%
“…However, their technique is restricted to image-based data transfer or storage, and it could not be relevant to other types of data. Furthermore, the authors did not investigate how various cover pictures or hidden images affected the functionality of their network [1].…”
Section: Related Workmentioning
confidence: 99%
“…The integration of intelligent technology with information technology is rapidly advancing, and remote monitoring and control through the internet is possible, but this convenience comes with potential security threats if proper measures are not taken [1] [2]. Smart devices like cameras must wirelessly transmit data to central servers due to limited energy and computing power [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation