2013
DOI: 10.12732/ijpam.v83i5.14
|View full text |Cite
|
Sign up to set email alerts
|

Image Steganography Based on Cellular Automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 9 publications
0
5
0
1
Order By: Relevance
“…e training process of GAN can be summarized as a Minimax game: discriminator D tries to maximize the probability of correctly distinguishing real samples from generated samples; generator model G tries to maximize the probability that discriminator model D cannot distinguish generated samples. e objective function when training GAN is shown in (1), where G (z) represents the sample generated by generator G according to input random noise vector z, and D (x) represents the probability that discriminator model D determines that sample x is the real sample:…”
Section: Gan and Itsmentioning
confidence: 99%
See 1 more Smart Citation
“…e training process of GAN can be summarized as a Minimax game: discriminator D tries to maximize the probability of correctly distinguishing real samples from generated samples; generator model G tries to maximize the probability that discriminator model D cannot distinguish generated samples. e objective function when training GAN is shown in (1), where G (z) represents the sample generated by generator G according to input random noise vector z, and D (x) represents the probability that discriminator model D determines that sample x is the real sample:…”
Section: Gan and Itsmentioning
confidence: 99%
“…Data hiding is an important technique to solve security problems and protect data. Steganography is an important branch of data hiding, which can be divided into image steganography [1,2], audio steganography [3,4], and video steganography [5,6], according to different carriers. Image steganography aims to conceal secret data within cover images transmitted through public channels without causing suspicion [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…La Tabla 1 muestra los valores de PSNR obtenidos para cada imagen en las diferentes versiones del algoritmo En otras investigaciones [10][11][12] obtienen valores de PSNR mayores a los reportados, pero es muy probable que sea por las dimensiones de imágenes que se utilizan. En estas investigaciones la imagen portadora tiene una capacidad en bits mayor que la mínima requerida para ocultar la imagen secreta.…”
Section: Psnrunclassified
“…us, N different dense images are generated. en, by transporting the secret image, the purpose of safe transport of the secret image is completed [8].…”
Section: Introductionmentioning
confidence: 99%