Results 1 to 10 of about 5,168 (229)

Lightweight image steganalysis with block-wise pruning [PDF]

open access: yesScientific Reports, 2023
Image steganalysis is the task of detecting a secret message hidden in an image. Deep steganalysis using end-to-end deep learning has been successful in recent years, but previous studies focused on improving detection performance rather than designing a
Eungi Hong   +3 more
doaj   +4 more sources

Image steganalysis using active learning and hyperparameter optimization [PDF]

open access: goldScientific Reports
Image steganalysis, detecting hidden data in digital images, is essential for enhancing digital security. Traditional steganalysis methods typically rely on large, pre-labeled image datasets, which are difficult and costly to compile.
Li Bohang   +9 more
doaj   +4 more sources

Multi-resolution network based image steganalysis model [PDF]

open access: diamondIntelligent and Converged Networks, 2023
Recently, many steganalysis approaches improve their feature extraction ability through adding convolutional layers. However, it often leads to a decrease of resolution in the feature map during downsampling, which makes it challenging to extract weak ...
Zimiao Wang, Jinsong Wu
doaj   +2 more sources

Sensitivity of deep learning applied to spatial image steganalysis [PDF]

open access: yesPeerJ Computer Science, 2021
In recent years, the traditional approach to spatial image steganalysis has shifted to deep learning (DL) techniques, which have improved the detection accuracy while combining feature extraction and classification in a single model, usually a ...
Reinel Tabares-Soto   +8 more
doaj   +3 more sources

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning [PDF]

open access: goldIEEE Access, 2019
Recently, the adaptive steganography methods have been developed to embed secret information with the minimal distortion of images. As the opposite art, steganalysis methods, especially some convolutional neural network-based steganalysis methods, have ...
Donghui Hu   +5 more
doaj   +2 more sources

Color image steganalysis based on quaternion discrete cosine transform

open access: goldElectronic Research Archive, 2023
With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention.
Meng Xu   +3 more
doaj   +2 more sources

Image Steganalysis with Binary Similarity Measures [PDF]

open access: goldEURASIP Journal on Advances in Signal Processing, 2005
We present a novel technique for steganalysis of images that have been subjected to embedding by steganographic algorithms. The seventh and eighth bit planes in an image are used for the computation of several binary similarity measures. The basic idea is that the correlation between the bit planes as well as the binary texture characteristics within ...
İsmail Avcıbaş   +3 more
openalex   +5 more sources

Enhancing Steganography Detection with AI: Fine-Tuning a Deep Residual Network for Spread Spectrum Image Steganography [PDF]

open access: yesSensors
This paper presents an extensive investigation into the application of artificial intelligence, specifically Convolutional Neural Networks (CNNs), in image steganography detection. We initially evaluated the state-of-the-art steganalysis model, SRNet, on
Oleksandr Kuznetsov   +5 more
doaj   +2 more sources

A Low Cost Image Steganalysis by Using Domain Adaptation

open access: greenInternational Journal of Information Science and Management, 2018
Information hiding and data encryption are used widely to protect data and information from anonymous access. In digital world, hiding and encrypting of the desired data into an image is a smart way to protect information with a low cost.
Mohammd Bagher Dastgheib   +2 more
doaj   +1 more source

FACSNet: Forensics aided content selection network for heterogeneous image steganalysis [PDF]

open access: yesScientific Reports
The main goal of image steganalysis, as a technique of confrontation with steganography, is to determine the presence or absence of secret information in conjunction with the specific statistical characteristics of the carrier.
Siyuan Huang   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy