Computationally secure steganography based on speech synthesis
The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the...
Saved in:
Main Authors: | Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022025 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A robust audio steganography algorithm based on differential evolution
by: Zhaopin SU, et al.
Published: (2021-11-01) -
Survey on image non-additive steganography
by: Yaofei WANG, et al.
Published: (2021-12-01) -
Digital steganography model and its formal description
by: Haitao SONG, et al.
Published: (2020-06-01) -
A COMPUTATIONAL SYSTEM FOR EVALUATING HUMAN PERCEPTION IN VIDEO STEGANOGRAPHY
by: Marcin PERY, et al.
Published: (2024-12-01) -
Audio steganography by quantization index modulation in the DCT domain
by: CHEN Ming1, et al.
Published: (2009-01-01)