IMAGE STEGANALYSIS AND SECURITYENHANCEMENT USING MIDPOINTTRANSFORMATION
Image steganalysis has developed into a severe challenge for digital communicationbecause it allows users to disguise harmful secret data inside images almost undetectably. Thisresearch presents a midpoint transformation technique which both discovers secret messageswhile preventing new message embedment.
null P. Lalitha Mani Priya +1 more
openaire +1 more source
Image steganalysis detects hidden information in digital images by identifying statistical anomalies, serving as a forensic tool to reveal potential covert communication.
Zhengliang Lai +4 more
doaj +1 more source
Image Steganography and Style Transformation Based on Generative Adversarial Network
Traditional image steganography conceals secret messages in unprocessed natural images by modifying the pixel value, causing the obtained stego to be different from the original image in terms of the statistical distribution; thereby, it can be detected ...
Li Li +5 more
doaj +1 more source
SEAP: squeeze-and-excitation attention guided pruning for lightweight steganalysis networks
In recent years, the increasing computational and storage demands of deep steganalysis models have drawn attention to lightweight architectures. While pruning algorithms for image steganalysis networks have been proposed, they often do not apply to ...
Qiushi Li +3 more
doaj +1 more source
Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram
In this paper we present a new accurate steganalysis method for the LSBreplacement steganography. The suggested method is based on the changes that occur in thehistogram of an image after the embedding of data.
M. Mahdavi +3 more
doaj
Image steganalysis using LSTM fused convolutional neural networks for secure telemedicine. [PDF]
Shehab D, Alhaddad M.
europepmc +1 more source
Blind Image Steganalysis A Review
Sindhav Bhumika A +2 more
openaire +1 more source
Deep steganographic approach for reliable data hiding using convolutional neural networks and adaptive loss optimization. [PDF]
P M, T GK.
europepmc +1 more source
Optimization-driven steganographic system based on fused maps and blowfish encryption. [PDF]
Aljughaiman A, Alrawashdeh R.
europepmc +1 more source
Assessment of a VoIP steganalysis method based on statistical analysis and deep neural network. [PDF]
Moghadasi HA, Dehghani H.
europepmc +1 more source

