2019
DOI: 10.1109/access.2019.2955990
|View full text |Cite
|
Sign up to set email alerts
|

Faster-RCNN Based Robust Coverless Information Hiding System in Cloud Environment

Abstract: Key distribution is the foundation for protecting users' privacy and communication security in cloud environment. Information hiding is an effective manner to hide the transmission behavior of secret information such as keys, and thus it makes the secure key distribution possible. However, the traditional information hiding systems usually embed the secret information by modifying the carrier, which inevitably leaves modification traces on the carrier. Thus, they cannot resist the detection of the steganalysis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

2
8

Authors

Journals

citations
Cited by 39 publications
(15 citation statements)
references
References 19 publications
0
15
0
Order By: Relevance
“…This method directly expresses the secret message utilizing the characteristics of the carrier [29]. Zhou et al use faster-RCNN for training to find the labels of images to express the secret message [30]. The network architecture based on deep learning has a large transmission overhead and requires a long training time.…”
Section: Muhuri Et Al Implement Image Steganography On Integer Wavele...mentioning
confidence: 99%
“…This method directly expresses the secret message utilizing the characteristics of the carrier [29]. Zhou et al use faster-RCNN for training to find the labels of images to express the secret message [30]. The network architecture based on deep learning has a large transmission overhead and requires a long training time.…”
Section: Muhuri Et Al Implement Image Steganography On Integer Wavele...mentioning
confidence: 99%
“…Generally, the traditional image steganography embeds secret information into a cover image by slightly modifying its content, and thus the modification traces will be inevitably left in the cover image, which makes successful steganalysis possible. The concept of "coverless steganography" was proposed in [11][12][13]. Instead of employing a designated cover image for embedding the secret data, appropriate images that already contain the secret data are chosen as stego-images for secret communication.…”
Section: Image Steganographymentioning
confidence: 99%
“…e generated hidden images and the extracted secret information had good visual effects. Zhou et al [24] proposed an information hiding technology using Faster-RCNN. is solution used Faster-RCNN to identify the contents of the carrier image and expressed secret data through these contents.…”
Section: Introductionmentioning
confidence: 99%