Computationally secure steganography based on speech synthesis
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the...
Main Author: | Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022025 |
Similar Items
-
High Capacity Audio Steganography Based on Contourlet Transform
by: Abbas Salman Hameed
Published: (2018-08-01) -
High Capacity Audio Steganography Based on Contourlet Transform
by: Abbas Salman Hameed
Published: (2022-02-01) -
Survey in Image and Audio Steganography by using the Deep Learning Methods
by: Zeina Al Hadad, et al.
Published: (2023-08-01) -
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression
by: Urmila Pilania, et al.
Published: (2022-08-01) -
A Coverless Audio Steganography Based on Generative Adversarial Networks
by: Jing Li, et al.
Published: (2023-03-01)