Enhanced brain image security using a hybrid of lifting wavelet transform and support vector machine. [PDF]
Mohamed AF +3 more
europepmc +1 more source
Reversible image steganography based on residual structure and attention mechanism. [PDF]
Liu L, Tong S, Xue Q.
europepmc +1 more source
HAG-NET: Hiding Data and Adversarial Attacking with Generative Adversarial Network. [PDF]
Fan H, Wang J.
europepmc +1 more source
Analysis of hybrid integer wavelet transform and singular value decomposition for image steganography under various noise conditions. [PDF]
Chinnusami M +4 more
europepmc +1 more source
Multifunctional Au-Ag-Cr Nanocomposites: From Multiplex Sensing and Advanced Logic Computing to Scalable Information Protection. [PDF]
Zhou J +5 more
europepmc +1 more source
A novel and efficient digital image steganography technique using least significant bit substitution. [PDF]
Rahman S +8 more
europepmc +1 more source
Related searches:
Steganalysis using image quality metrics
IEEE Transactions on Image Processing, 2003We present techniques for steganalysis of images that have been potentially subjected to steganographic algorithms, both within the passive warden and active warden frameworks. Our hypothesis is that steganographic schemes leave statistical evidence that can be exploited for detection with the aid of image quality features and multivariate regression ...
Sankur, B, Memon, N, Avcibas, I
openaire +3 more sources
Steganalysis of Halftone Images
Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., 2006We present a novel steganalysis technique for halftone images without knowledge of the original cover image. We first convert halftone images into grayscale-like images by low-pass filtering. The low-pass-filtered image is then decomposed using quadrature mirror filters, and a set of subband coefficients are generated at different scales and ...
null Ming Jiang +3 more
openaire +1 more source
Steganalysis of overlapping images
SPIE Proceedings, 2015We examine whether steganographic images can be detected more reliably when there exist other images, taken with the same camera under the same conditions, of the same scene. We argue that such a circumstance is realistic and likely in practice. In `laboratory conditions' mimicking circumstances favourable to the analyst, and with a custom set of ...
James M. Whitaker, Andrew D. Ker
openaire +1 more source
Image steganography and steganalysis
WIREs Computational Statistics, 2011AbstractImage steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today's digital world ...
Mayra Bachrach, Frank Y. Shih
openaire +1 more source

