Among steganalysis techniques, detection against motion vector (MV)
doma...
Noisy label problems are inevitably in existence within medical image
se...
With the popularization and application of privacy protection technologi...
Cost assignment in the motion vector domain remains a research focus in ...
Considering the prospects of public key embedding (PKE) mechanism in act...
Reversible data hiding in encrypted domain (RDH-ED) schemes based on
sym...
In the past few years, the Generative Adversarial Network (GAN) which
pr...
In this paper, a new data-driven information hiding scheme called genera...
In order to keep the data secret, various techniques have been implement...
In order to keep the data secret, various techniques have been implement...
In this paper, a new framework for construction of Cardan grille for
inf...
The distortion in steganography that usually comes from the modification...