Results 51 to 60 of about 4,115 (191)

Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network

open access: yesSINTECH (Science and Information Technology) Journal, 2023
In the era of information technology, it is very important to protect data and information so that irresponsible parties do not misuse it. One technique for securing data is steganography. Steganography is a technique of hiding messages in a medium.
Khairunnisak Khairunnisak   +2 more
doaj   +1 more source

Steganographer Identification

open access: yes, 2019
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig   +46 more
core   +1 more source

A Novel Image Steganographic Method Based on Enhanced PIWT and Modified Optimal Pixel Adjustment Process

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal   +2 more
wiley   +1 more source

Distinguishing Computer-generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning

open access: yes, 2018
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong   +4 more
core   +2 more sources

Detecting Deepfakes Using Two‐Stream Framework Based on EfficientNet and Vision Transformer

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
The ever‐growing threat of deepfake technology has stimulated research in deepfake forensics to identify the genuineness of media materials on the Internet. The majority of existing techniques employ the convolutional neural network (CNN) framework to identify deepfake by capturing the image’s local features.
Qiang Yang   +4 more
wiley   +1 more source

Enhanced image‐splicing classification: A resilient and scale‐invariant approach utilizing edge‐weighted local texture features

open access: yesJournal of Forensic Sciences, Volume 70, Issue 6, Page 2297-2308, November 2025.
Abstract The spread of image editing tools demonstrates how modern mixed‐media technology enables changes in digital images. Such easy access raises severe moral and legal concerns around the potential for malicious image editing. Overcoming this difficulty will need the development of innovative approaches for the quick detection of changes in high ...
Arslan Akram   +4 more
wiley   +1 more source

Stego-Image Synthesis Employing Data-Driven Continuous Variable Representations of Cover Images

open access: yesIEEE Access
The security of stego-images is a crucial foundation for analyzing steganography algorithms. Recently, steganography has made significant strides in ongoing conflicts with steganalysis.
Saleh Naif Almuayqil   +4 more
doaj   +1 more source

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1269-1290, October 2025.
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil   +4 more
wiley   +1 more source

Steganographic Generative Adversarial Networks

open access: yes, 2019
Steganography is collection of methods to hide secret information ("payload") within non-secret information "container"). Its counterpart, Steganalysis, is the practice of determining if a message contains a hidden payload, and recovering it if possible.
Burnaev, Evgeny   +2 more
core   +1 more source

RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1422-1445, October 2025.
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy