2022
DOI: 10.1109/tdsc.2022.3181039
|View full text |Cite
|
Sign up to set email alerts
|

Cover Selection for Steganography Using Image Similarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(15 citation statements)
references
References 47 publications
0
15
0
Order By: Relevance
“…The use of SRM features to measure the security of various cover selection strategies is highlighted for clarity. The strategies under comparison encompass joint cover selection, minimum distortion selection, and the similarity-based strategy outlined in literature 24 , literature 13 , and literature 14 . The experimental procedure is as follows: We crafted the vector selection in this study through a hybrid training approach involving pre-trained SRNet.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The use of SRM features to measure the security of various cover selection strategies is highlighted for clarity. The strategies under comparison encompass joint cover selection, minimum distortion selection, and the similarity-based strategy outlined in literature 24 , literature 13 , and literature 14 . The experimental procedure is as follows: We crafted the vector selection in this study through a hybrid training approach involving pre-trained SRNet.…”
Section: Resultsmentioning
confidence: 99%
“…Conversely, acquiring a steganalysis pre-trained model is straightforward and facilitates real-time image analysis. Moreover, Wang et al 14 have provided evidence of the impracticality of their technique when handling multi-image stego scenarios with varying embedding rates and steganography algorithms.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, the data protection issue has become a special concern of academia and industry. There are various schemes to protect data security, such as data hiding [1], [2], encryption [3], [4], hashing [5]- [7] and secret sharing (SS) [8]- [11]. As significant data expressions, digital images can be applied to many applications, such as photography, military, medicine, and legal forensics.…”
Section: Introductionmentioning
confidence: 99%