2022
DOI: 10.1007/s11042-022-13206-2
|View full text |Cite
|
Sign up to set email alerts
|

An image steganography scheme based on ResNet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…ResNet is one of the most widely used deep learning models in pattern and image recognition. ResNet can train a large number of data sets and store the acquired knowledge. , ResNet can obtain enough features by increasing the network depth so that it can fit nonlinear function as far as possible to achieve the purpose of approximation. , So, ResNet architecture was chosen to explore its potential for microorganism recognition.…”
Section: Resultsmentioning
confidence: 99%
“…ResNet is one of the most widely used deep learning models in pattern and image recognition. ResNet can train a large number of data sets and store the acquired knowledge. , ResNet can obtain enough features by increasing the network depth so that it can fit nonlinear function as far as possible to achieve the purpose of approximation. , So, ResNet architecture was chosen to explore its potential for microorganism recognition.…”
Section: Resultsmentioning
confidence: 99%
“…[20] proposed a steganography method based on generative adversarial networks (GANs) for digital images, Liu at al. [21] proposed an image steganography scheme based on generalized Gaussian distribution and orthogonal matching pursuit (OMP), and Gupta and Rawat [22] proposed a novel image steganography approach based on multi-layer perceptron (MLP) and convolutional neural network (CNN). However, the work volume does not allow for a detailed discussion of these items.…”
Section: Frequency Domain Techniquesmentioning
confidence: 99%
“…Edges were used in the embedding of the image via most-significant bit (MSB) and two axes of LSB and using edges to increase the payload capacity of the image for the data, where the number of bits used in one pixel reached three bits, where the result of the embedding was efficient in terms of capacity, but few in terms of security [19]. A new method was proposed by [20] of using training for the method of hiding deep information, which proved its worth in including a large amount of data in the cover of the image, and through the outputs represented by peak signal to noise ratio (PSNR) and structural similarity index measure (SSIM), the method proved the efficiency of the method, which reflects the strength and applicability of the method used.…”
Section: Related Workmentioning
confidence: 99%