Please use this identifier to cite or link to this item:
https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4921
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jagoda, J. K. K. K. | - |
dc.date.accessioned | 2025-08-18T09:16:16Z | - |
dc.date.available | 2025-08-18T09:16:16Z | - |
dc.date.issued | 2025-06-30 | - |
dc.identifier.uri | https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4921 | - |
dc.description.abstract | Abstract Inrecentyears,CoverlessImageSteganography(CIS)hasemergedasapromis- ing alternativetotraditionalsteganographictechniquesbyeliminatingtheneed forexplicitdataembeddingandinsteadutilizingnaturallyoccurringorgenerated imagesascarriers.However,currentCISmethodsoftensu!erfromlowhiding capacity,limitedtoconcealingasingleimage,ando!er insu”cientrobustnessand securitywhenhandlingmultiplesecretimagessimultaneously. To addresstheselimitations,wepresentanovelmulti-imagecoverlessstegano- graphic frameworktailoredforRGBimages,capableofsecurelytransmittingand reconstructinguptofoursecretimagesusingasinglefusedcarrierimage.Un- likeconventionalmethodsthatdependonpre-existingcoverimages,ourmodel generates anintermediatecarrierimagethroughasophisticatedpixel-levelfusion techniquethatmergesvisualinformationfrommultipleRGBsecretimageswhile ensuringcompleteperceptualinvisibilityoftheoriginalcontent.Thisfusionpro- cess guaranteesthatthecarrierimagecontainsnovisuallyidentifiabletracesof the concealedimages,o!eringaninherentlysecureandstealthyrepresentation. To furtherstrengthenconcealment,thefusedcarrierundergoesmultipleroundsof imagescramblingtransformations,makingunauthorizeddecodingvirtuallydi”- cult.Wealsointegratearobuststeganographickeymechanism,restrictingaccess and decodingcapabilitiesexclusivelytoauthorizedreceiversequippedwiththe correctkey.Thisensuresthatevenifthecarrierisintercepted,thehiddencontent remainssecureandunrecoverablewithouttheproperdecryptioncontext. In thedecodingphase,weproposearefinementalgorithmdesignedtorestore fine-graineddetailslostduringthefusionandscramblingprocesses.Thisalgo- rithmsignificantlyenhancesreconstructionfidelityandvisualquality,eveninthe presenceofadversarialconditionssuchasnoise,tampering,orgeometrictransfor- mations. ComprehensiveexperimentsonbenchmarkRGBimagedatasetsvalidatetheef- fectivenessofourproposedmodel,demonstratingsubstantiallyhigherhidingca- pacity,minimalvisualdistortion,andresilienceagainststatisticalandperceptual steganalysisattacks.ComparedtoexistingCISapproaches,ourmethodo!ers a moresecure,high-capacity,andvisuallyimperceptiblesolutionformulti-image coverlesssteganography,layingthefoundationfornext-generationcovertcommu- nicationsystems. | en_US |
dc.language.iso | en | en_US |
dc.subject | Multi-imageSteganography,CoverlessImageSteganogra- phy,SteganographicKey. | en_US |
dc.title | Coverless Multi-Image Steganography for RGB Images: Generative Adversarial Networks based Approach & Steganographic Key based Approach | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | 2025 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
20000804 - J.K.K.K.Jagoda - Kimuthu Kisal.pdf | 25.29 MB | Adobe PDF | View/Open |
Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.