Please use this identifier to cite or link to this item:
https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4921Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jagoda, J. K. K. K. | - |
| dc.date.accessioned | 2025-08-18T09:16:16Z | - |
| dc.date.available | 2025-08-18T09:16:16Z | - |
| dc.date.issued | 2025-06-30 | - |
| dc.identifier.uri | https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4921 | - |
| dc.description.abstract | Abstract Inrecentyears,CoverlessImageSteganography(CIS)hasemergedasapromis- ing alternativetotraditionalsteganographictechniquesbyeliminatingtheneed forexplicitdataembeddingandinsteadutilizingnaturallyoccurringorgenerated imagesascarriers.However,currentCISmethodsoftensu!erfromlowhiding capacity,limitedtoconcealingasingleimage,ando!er insu”cientrobustnessand securitywhenhandlingmultiplesecretimagessimultaneously. To addresstheselimitations,wepresentanovelmulti-imagecoverlessstegano- graphic frameworktailoredforRGBimages,capableofsecurelytransmittingand reconstructinguptofoursecretimagesusingasinglefusedcarrierimage.Un- likeconventionalmethodsthatdependonpre-existingcoverimages,ourmodel generates anintermediatecarrierimagethroughasophisticatedpixel-levelfusion techniquethatmergesvisualinformationfrommultipleRGBsecretimageswhile ensuringcompleteperceptualinvisibilityoftheoriginalcontent.Thisfusionpro- cess guaranteesthatthecarrierimagecontainsnovisuallyidentifiabletracesof the concealedimages,o!eringaninherentlysecureandstealthyrepresentation. To furtherstrengthenconcealment,thefusedcarrierundergoesmultipleroundsof imagescramblingtransformations,makingunauthorizeddecodingvirtuallydi”- cult.Wealsointegratearobuststeganographickeymechanism,restrictingaccess and decodingcapabilitiesexclusivelytoauthorizedreceiversequippedwiththe correctkey.Thisensuresthatevenifthecarrierisintercepted,thehiddencontent remainssecureandunrecoverablewithouttheproperdecryptioncontext. In thedecodingphase,weproposearefinementalgorithmdesignedtorestore fine-graineddetailslostduringthefusionandscramblingprocesses.Thisalgo- rithmsignificantlyenhancesreconstructionfidelityandvisualquality,eveninthe presenceofadversarialconditionssuchasnoise,tampering,orgeometrictransfor- mations. ComprehensiveexperimentsonbenchmarkRGBimagedatasetsvalidatetheef- fectivenessofourproposedmodel,demonstratingsubstantiallyhigherhidingca- pacity,minimalvisualdistortion,andresilienceagainststatisticalandperceptual steganalysisattacks.ComparedtoexistingCISapproaches,ourmethodo!ers a moresecure,high-capacity,andvisuallyimperceptiblesolutionformulti-image coverlesssteganography,layingthefoundationfornext-generationcovertcommu- nicationsystems. | en_US |
| dc.language.iso | en | en_US |
| dc.subject | Multi-imageSteganography,CoverlessImageSteganogra- phy,SteganographicKey. | en_US |
| dc.title | Coverless Multi-Image Steganography for RGB Images: Generative Adversarial Networks based Approach & Steganographic Key based Approach | en_US |
| dc.type | Thesis | en_US |
| Appears in Collections: | 2025 | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 20000804 - J.K.K.K.Jagoda - Kimuthu Kisal.pdf | 25.29 MB | Adobe PDF | View/Open |
Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.