Results 11 to 20 of about 5,168 (229)

Digital image steganalysis network strengthening framework based on evolutionary algorithm [PDF]

open access: yesScientific Reports
To solve the problem of increasing network parameters and increasing fitting fluctuation during training due to the improvement or expansion of image steganalysis network, a framework for strengthening steganalysis network was considered.
Yuanyuan Ma   +5 more
doaj   +2 more sources

Detection of Classifier Inconsistencies in Image Steganalysis [PDF]

open access: greenProceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
In this paper, a methodology to detect inconsistencies in classification-based image steganalysis is presented. The proposed approach uses two classifiers: the usual one, trained with a set formed by cover and stego images, and a second classifier trained with the set obtained after embedding additional random messages into the original training set ...
Daniel Lerch-Hostalot, David Megías
openalex   +5 more sources

AGASI: A Generative Adversarial Network-Based Approach to Strengthening Adversarial Image Steganography [PDF]

open access: yesEntropy
Steganography has been widely used in the field of image privacy protection. However, with the advancement of steganalysis techniques, deep learning-based models are now capable of accurately detecting modifications in stego-images, posing a significant ...
Haiju Fan, Changyuan Jin, Ming Li
doaj   +2 more sources

WPD-based blind image steganalysis

open access: yesTongxin xuebao, 2008
Based on wavelet package decomposition(WPD),a new blind image steganalysis method was presented,which can detect the stego images with comparatively high accuracy.Firstly,by three scales of WPD,image was decomposed into some coefficient subbands,and the ...
LUO Xiang-yang1   +2 more
doaj   +3 more sources

Statistical Steganalysis of Images

open access: green, 2019
Steganalysis is the study of detecting secret information hidden in objects such as images, videos, texts, time series and games via steganography. Among those objects, the image is the most widely used object to hide secret messages. Detection of possible secret information hidden in images has attracted a lot of attention over the past ten years ...
Min Huang
openalex   +3 more sources

Security-oriented steganographic payload allocation for multi-remote sensing images [PDF]

open access: yesScientific Reports
Multi-image steganography, a technique for concealing information within multiple carrier mediums, finds remote sensing images to be particularly apt carriers due to their complex structures and abundant texture data.
Tian Wu, Xuan Hu, Chunnian Liu
doaj   +2 more sources

IMAGE STEGANALYSIS AND SECURITYENHANCEMENT USING MIDPOINTTRANSFORMATION

open access: diamondinternational journal of engineering technology and management sciences
Image steganalysis has developed into a severe challenge for digital communicationbecause it allows users to disguise harmful secret data inside images almost undetectably. Thisresearch presents a midpoint transformation technique which both discovers secret messageswhile preventing new message embedment.
P. S. Lal Priya, Dr.Bhaskara Reddy
openalex   +2 more sources

Home - About - Disclaimer - Privacy