The following publications are possibly variants of this publication:
- Coverless Steganography Based on Motion Analysis of VideoYun Tan, Jiaohua Qin, Xuyu Xiang, Chunhu Zhang, Zhangdong Wang. scn, 2021, 2021. [doi]
- A robust coverless video steganography based on maximum DC coefficients against video attacksLaijin Meng, Xinghao Jiang, Zhenzhen Zhang, Zhaohong Li, Tanfeng Sun. mta, 83(5):13427-13461, February 2024. [doi]
- A Robust Coverless Image Steganography Based on an End-to-End Hash Generation ModelLaijin Meng, Xinghao Jiang, Zhenzhen Zhang, Zhaohong Li, Tanfeng Sun. tcsv, 33(7):3542-3558, July 2023. [doi]
- A Robust Coverless Steganography Scheme Using Camouflage ImageQiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang. tcsv, 32(6):4038-4051, 2022. [doi]
- Robust coverless steganography using limited mapping imagesXiyao Liu 0001, Zhaoying Li, Junxing Ma, Wei Zhang, Jian Zhang, Yipeng Ding. jksucis, 34(7):4472-4482, 2022. [doi]
- Coverless Image Steganography Based on Multi-Object RecognitionYuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan. tcsv, 31(7):2779-2791, 2021. [doi]
- A coverless steganography method based on generative adversarial networkXintao Duan, Baoxia Li, Daidou Guo, Zhen Zhang, Yuanyuan Ma. ejivp, 2020(1):18, 2020. [doi]
- Coverless image steganography based on DenseNet feature mappingQiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Yao Qiu. ejivp, 2020(1):39, 2020. [doi]