2020
DOI: 10.1007/s11554-020-00947-2
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to the special issue on deep learning for real-time information hiding and forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…The obtained experimental results are compared with the other state-of-the-art methods [29,30,21] of image-based secret information hiding. Zhou et al utilized two formal approaches, one is information hiding and the other is digital forensics; the feature of this research was successfully applied for the prevention of multimedia copyright, privacy, security, and protection [29]. But the massive growth of data in the cloud environment creates challenges for forensic experts in this research [29,21].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The obtained experimental results are compared with the other state-of-the-art methods [29,30,21] of image-based secret information hiding. Zhou et al utilized two formal approaches, one is information hiding and the other is digital forensics; the feature of this research was successfully applied for the prevention of multimedia copyright, privacy, security, and protection [29]. But the massive growth of data in the cloud environment creates challenges for forensic experts in this research [29,21].…”
Section: Resultsmentioning
confidence: 99%
“…Zhou et al utilized two formal approaches, one is information hiding and the other is digital forensics; the feature of this research was successfully applied for the prevention of multimedia copyright, privacy, security, and protection [29]. But the massive growth of data in the cloud environment creates challenges for forensic experts in this research [29,21]. With the rapid use of multimedia systems, in the proposed scheme we overcome threats involved in cyberenvironment, manipulating critical information such as transaction details, intellectual rights, and encrypted secrecy integrity, by using stream cipher strategy.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We utilise the encoder module E (•) to encode the cover image I cover and secret information M in to generate a steganographic image I encode . I cover and I encode all select RGB images whose the size is C × H × W , and the hidden message M in is a randomly generated binary message with a size of D × H × W , where D is the relative payload depth, D ∈ [1,6]. Similarly, the decoder module D(•) is utilised to accurately extract the embedded information M out from the generated image I encode .…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…In the training process of HCISNet, we randomly generate uniformly distributed binary data as secret message, which can greatly improve the generalization ability of the network. In detail, the data size is D×H×W, D∈ [1,6].…”
Section: Settingsmentioning
confidence: 99%