Results 51 to 60 of about 4,115 (191)
Implementasi Steganografi Gambar Menggunakan Algoritma Generative Adversarial Network
In the era of information technology, it is very important to protect data and information so that irresponsible parties do not misuse it. One technique for securing data is steganography. Steganography is a technique of hiding messages in a medium.
Khairunnisak Khairunnisak +2 more
doaj +1 more source
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig +46 more
core +1 more source
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal +2 more
wiley +1 more source
Computer-generated graphics (CGs) are images generated by computer software. The~rapid development of computer graphics technologies has made it easier to generate photorealistic computer graphics, and these graphics are quite difficult to distinguish ...
Hu, Weitong +4 more
core +2 more sources
Detecting Deepfakes Using Two‐Stream Framework Based on EfficientNet and Vision Transformer
The ever‐growing threat of deepfake technology has stimulated research in deepfake forensics to identify the genuineness of media materials on the Internet. The majority of existing techniques employ the convolutional neural network (CNN) framework to identify deepfake by capturing the image’s local features.
Qiang Yang +4 more
wiley +1 more source
Abstract The spread of image editing tools demonstrates how modern mixed‐media technology enables changes in digital images. Such easy access raises severe moral and legal concerns around the potential for malicious image editing. Overcoming this difficulty will need the development of innovative approaches for the quick detection of changes in high ...
Arslan Akram +4 more
wiley +1 more source
Stego-Image Synthesis Employing Data-Driven Continuous Variable Representations of Cover Images
The security of stego-images is a crucial foundation for analyzing steganography algorithms. Recently, steganography has made significant strides in ongoing conflicts with steganalysis.
Saleh Naif Almuayqil +4 more
doaj +1 more source
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil +4 more
wiley +1 more source
Steganographic Generative Adversarial Networks
Steganography is collection of methods to hide secret information ("payload") within non-secret information "container"). Its counterpart, Steganalysis, is the practice of determining if a message contains a hidden payload, and recovering it if possible.
Burnaev, Evgeny +2 more
core +1 more source
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy +3 more
wiley +1 more source

