Results 91 to 100 of about 4,115 (191)

IMAGE STEGANALYSIS AND SECURITYENHANCEMENT USING MIDPOINTTRANSFORMATION

open access: yesinternational journal of engineering technology and management sciences
Image steganalysis has developed into a severe challenge for digital communicationbecause it allows users to disguise harmful secret data inside images almost undetectably. Thisresearch presents a midpoint transformation technique which both discovers secret messageswhile preventing new message embedment.
null P. Lalitha Mani Priya   +1 more
openaire   +1 more source

SG-ResNet: Spatially Adaptive Gabor Residual Networks with Density-Peak Guidance for Joint Image Steganalysis and Payload Location

open access: yesMathematics
Image steganalysis detects hidden information in digital images by identifying statistical anomalies, serving as a forensic tool to reveal potential covert communication.
Zhengliang Lai   +4 more
doaj   +1 more source

Image Steganography and Style Transformation Based on Generative Adversarial Network

open access: yesMathematics
Traditional image steganography conceals secret messages in unprocessed natural images by modifying the pixel value, causing the obtained stego to be different from the original image in terms of the statistical distribution; thereby, it can be detected ...
Li Li   +5 more
doaj   +1 more source

SEAP: squeeze-and-excitation attention guided pruning for lightweight steganalysis networks

open access: yesEURASIP Journal on Information Security
In recent years, the increasing computational and storage demands of deep steganalysis models have drawn attention to lightweight architectures. While pruning algorithms for image steganalysis networks have been proposed, they often do not apply to ...
Qiushi Li   +3 more
doaj   +1 more source

Steganalysis Method for LSB Replacement Based on Local Gradient of Image Histogram

open access: yesIranian Journal of Electrical and Electronic Engineering, 2008
In this paper we present a new accurate steganalysis method for the LSBreplacement steganography. The suggested method is based on the changes that occur in thehistogram of an image after the embedding of data.
M. Mahdavi   +3 more
doaj  

Blind Image Steganalysis A Review

open access: yesInternational Journal of Computer Sciences and Engineering, 2019
Sindhav Bhumika A   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy