Article
Computer Science, Information Systems
Mar Gimenez-Aguilar, Jose M. De Fuentes, Lorena Gonzalez-Manzano, Carmen Camara
Summary: This paper explores the feasibility of using Ethereum technology to establish a covert channel, presenting a mechanism called Zephyrus for information hiding. Experimental results show that a significant amount of data can be embedded and retrieved at a relatively low cost.
Article
Computer Science, Artificial Intelligence
Fatuma Saeid Hassan, Adnan Gutub
Summary: Data hiding technologies aim to hide secret information within digital covers by causing unnoticeable degradation to their quality, with the main focus on reducing image distortion and increasing embedding capacity. This article proposes two high payload embedding methods using the HSV colour model.
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY
(2022)
Review
Computer Science, Artificial Intelligence
Anna Melman, Oleg Evsutin
Summary: The digital content exchange on the Internet poses information security risks. Hiding data in digital images is a promising way to protect data and serves as an alternative to cryptographic methods. Steganography algorithms create hidden communication channels and ensure the confidentiality of embedded messages. Watermarking algorithms embed invisible marks in images for image authentication and authorship proof.
ARTIFICIAL INTELLIGENCE REVIEW
(2023)
Article
Engineering, Electrical & Electronic
Ping Wei, Zhiying Zhu, Ge Luo, Zhenxing Qian, Xinpeng Zhang
Summary: This letter proposes a general end-to-end data hiding break approach for OSNs called the Secret Data Remover (SDR), which is universal for various robust steganography and robust watermarking algorithms. It also introduces two novel techniques, image fusion and latent renewal, to enhance image quality and overall performance.
IEEE SIGNAL PROCESSING LETTERS
(2022)
Article
Chemistry, Analytical
Alexandr Kuznetsov, Alexander Onikiychuk, Olga Peshkova, Tomasz Gancarczyk, Kornel Warwas, Ruslana Ziubina
Summary: Direct spread spectrum technology is commonly used in radio communication systems and this paper investigates its application in hiding data in audio files. Experimental studies reveal a method that provides a lower bit error rate with equal peak signal-to-noise ratio. Recommendations are provided for forming spreading sequences to reliably and safely hide informational messages in audio files.
Article
Computer Science, Information Systems
Fatuma Saeid Hassan, Adnan Gutub
Summary: This paper proposes an interpolation-based reversible data hiding (RDH) method to improve embedding capacity and security. Experimental results demonstrate that the proposed quadratic Bezier interpolation technique reduces computational complexity while maintaining image quality.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Computer Science, Information Systems
Samar Kamil, Siti Norul Huda Sheikh Abdullah, Mohammad Kamrul Hasan, Yazan M. Alomari, Zaid Alyasseri
Summary: Data security is a critical challenge in digital information, and steganography algorithms are used to hide confidential data in cover media. However, using a reference matrix in puzzle-based algorithms can lead to security vulnerabilities. This paper proposes the Binary Nonogram Puzzle (BNP) technique, which hides secret data in the cover by searching indexes based on the least significant bit (LSB) of cover pixels. The effectiveness of BNP is tested on standard dataset images and evaluated using PSNR and MSE, showing higher PSNR and lower MSE compared to existing puzzles.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Aditya Kumar Sahu, Gandharba Swain
Summary: Due to the inefficiency of reversible data hiding image steganography approaches in hiding large volumes of secret data, the authors propose two improved approaches based on reversible data hiding. Experimental results show the superiority of these methods.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Multidisciplinary Sciences
Jason Lin, Chia-Wei Tsai, Chun-Wei Yang, Kuan-Hung Liu
Summary: This paper proposes a novel data-hiding scheme that allows embedding large payloads while maintaining high stego-image quality. The method offers higher hiding capacity than previous works, with the ability to adjust the capacity by varying the parameter N, ensuring security.
Article
Computer Science, Information Systems
Jason Lin, Kuan-Hung Liu, Cih-Lian Lin
Summary: This study proposes a novel data hiding scheme using a multidimensional reference tensor (MRT) to achieve customized adjustments to the embedding capacity and security level. The method can freely adjust the embedding capacity while maintaining a balance between visual imperceptibility, reduce overall memory usage by nearly 99% based on a scalable index encoding (SIE) technique, and customize the level of security by simply altering the number of dimensions or the side length. Experimental results show that the proposed method achieves a peak signal-to-noise ratio (PSNR) of 46.38 dB with an embedding capacity of 2 bpp, which is equivalent to state-of-the-art methods.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Wenjia Ding, Huyin Zhang, Ralf Reulke, Yulin Wang
Summary: Data hiding is a technology that hides secret information in publicly available media and makes it difficult for people to detect its existence. This paper proposes a lightweight large-capacity image data hiding technique, which improves the sensitivity and positioning accuracy of tampering and ensures the confidentiality of hidden data.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Alexandr Kuznetsov, Anna Kononchenko, Natalia Kryvinska
Summary: This article discusses techniques for hiding data in vector images, including hiding methods and potential issues. By implementing data hiding and conducting a series of experiments, the authors evaluate the performance of different hiding techniques in the face of affine transformations and resizing of vector image files, and substantiate the advantages and conditions of using the studied algorithms. Additionally, the authors have developed a cross-platform software implementation to support the research.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Multidisciplinary Sciences
Juan Lin, Chin-Chen Chang, Ji-Hwei Horng
Summary: The topic of hiding secret data in digital images is important in information security research, as it allows for the transmission of data without drawing attention. The proposed reversible data hiding scheme for AMBTC-compressed images in this paper offers better visual quality and higher data embedding capacity.
Article
Computer Science, Information Systems
Sabyasachi Pramanik
Summary: Determining the best place for inserting hidden messages in steganographic pictures remains a challenging problem. This study suggests a new high performance image steganography method using extreme machine learning algorithms (ELM) to build a supervised mathematical model. The findings show that the proposed method surpasses current approaches in terms of imperceptibility while retaining visual image detail.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Subhajit Roy, Jaydeep Howlader, Goutam Sanyal
Summary: With the progress of information technology, it has become possible to quickly transfer multimedia information over the Internet. As video data on the Internet continues to grow, video steganography has become a popular choice for data hiding. This paper introduces a new approach to steganography that is based on video frames. By applying a region selection method and principal component analysis (PCA) for compression and embedding of secret data, the proposed method achieves higher embedding capacity and better visual quality, while also improving robustness against known attacks on the channel.
MULTIMEDIA TOOLS AND APPLICATIONS
(2022)
Article
Mathematics, Applied
Junfeng Cao, Ke Chen, Huan Han
Summary: This paper proposes a two-stage image segmentation model based on structure tensor and fractional-order regularization. In the first stage, fractional-order regularization is used to approximate the Hausdorff measure of the MS model. The solution is found using the ADI scheme. In the second stage, thresholding is used for target segmentation. The proposed model demonstrates superior performance compared to state-of-the-art methods.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)
Article
Mathematics, Applied
Dylan J. Oliver, Ian W. Turner, Elliot J. Carr
Summary: This paper discusses a projection-based framework for numerical computation of advection-diffusion-reaction (ADR) equations in heterogeneous media with multiple layers or complex geometric structures. By obtaining approximate solutions on a coarse grid and reconstructing solutions on a fine grid, the computational cost is significantly reduced while accurately approximating complex solutions.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)
Article
Mathematics, Applied
Nathan V. Roberts, Sean T. Miller, Stephen D. Bond, Eric C. Cyr
Summary: In this study, the time-marching discontinuous Petrov-Galerkin (DPG) method is applied to the Vlasov equation for the first time, using backward Euler for a Vlasov-Poisson discretization. Adaptive mesh refinement is demonstrated on two problems: the two-stream instability problem and a cold diode problem.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)
Article
Mathematics, Applied
Yizhi Sun, Zhilin Sun
Summary: This work investigates the convexity of a specific class of positive definite probability measures and demonstrates the preservation of convexity under multiplication and intertwining product. The study reveals that any integrable function on an interval with a polynomial expansion of fast absolute convergence can be decomposed into a pair of positive convex interval probabilities, simplifying the study of interval distributions and discontinuous probabilistic Galerkin schemes.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)
Article
Mathematics, Applied
Bhagwan Singh, Komal Jangid, Santwana Mukhopadhyay
Summary: This paper examines the prediction of bending characteristics of nanoscale materials using the Moore-Gibson-Thompson thermoelasticity theory in conjunction with the nonlocal strain gradient theory. The study finds that the stiffness of the materials can be affected by nonlocal and length-scale parameters, and the aspect ratios of the beam structure play a significant role in bending simulations.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)
Article
Mathematics, Applied
Guoliang Wang, Bo Zheng, Yueqiang Shang
Summary: This paper presents and analyzes a parallel finite element post-processing algorithm for the simulation of Stokes equations with a nonlinear damping term, which integrates the algorithmic advantages of the two-level approach, the partition of unity method, and the post-processing technique. The algorithm generates a global continuous approximate solution using the partition of unity method and improves the smoothness of the solution by adding an extra coarse grid correction step. It has good parallel performance and is validated through theoretical error estimates and numerical test examples.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)
Article
Mathematics, Applied
Hao Xu, Zeng-Qi Wang
Summary: Fluid flow control problems are crucial in industrial applications, and solving the optimal control of Navier-Stokes equations is challenging. By using Oseen's approximation and matrix splitting preconditioners, we can efficiently solve the linear systems and improve convergence.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)
Article
Mathematics, Applied
Zhengya Yang, Xuejuan Chen, Yanping Chen, Jing Wang
Summary: This paper focuses on the high-order stable numerical solutions of the time-space fractional diffusion equation. The Fourier spectral method is used for spatial discretization and the Spectral Deferred Correction (SDC) method is used for numerical solutions in time. As a result, a high-precision numerical discretization scheme for solving the fractional diffusion equation is obtained, and the convergence and stability of the scheme are proved. Several numerical examples are presented to demonstrate the effectiveness and feasibility of the proposed numerical scheme.
COMPUTERS & MATHEMATICS WITH APPLICATIONS
(2024)