Results 61 to 70 of about 5,168 (229)

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1269-1290, October 2025.
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil   +4 more
wiley   +1 more source

Coverless Image Steganography Based on Generative Adversarial Network

open access: yesMathematics, 2020
Traditional image steganography needs to modify or be embedded into the cover image for transmitting secret messages. However, the distortion of the cover image can be easily detected by steganalysis tools which lead the leakage of the secret message. So
Jiaohua Qin   +5 more
doaj   +1 more source

RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1422-1445, October 2025.
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy   +3 more
wiley   +1 more source

Exploring the Grammatical Complexity of International Teaching Assistants: A Comparative Corpus Study

open access: yesTESOL Quarterly, Volume 59, Issue 2, Page 874-906, June 2025.
Abstract The purpose of this study is to analyze the grammatical complexity features of international teaching assistants' (ITAs) mock‐teaching presentations and to compare the distributions of these features to those found in the Oral English Proficiency Test (a local ITA assessment), university classroom teaching, conversation, and academic writing ...
Heesun Chang, Amin Raeisi‐Vanani
wiley   +1 more source

Stego-Image Synthesis Employing Data-Driven Continuous Variable Representations of Cover Images

open access: yesIEEE Access
The security of stego-images is a crucial foundation for analyzing steganography algorithms. Recently, steganography has made significant strides in ongoing conflicts with steganalysis.
Saleh Naif Almuayqil   +4 more
doaj   +1 more source

Wavelet‐Based Texture Mining and Enhancement for Face Forgery Detection

open access: yesIET Biometrics, Volume 2025, Issue 1, 2025.
Due to the abuse of deep forgery technology, the research on forgery detection methods has become increasingly urgent. The corresponding relationship between the frequency spectrum information and the spatial clues, which is often neglected by current methods, could be conducive to a more accurate and generalized forgery detection.
Xin Li   +4 more
wiley   +1 more source

Steganographic Generative Adversarial Networks

open access: yes, 2019
Steganography is collection of methods to hide secret information ("payload") within non-secret information "container"). Its counterpart, Steganalysis, is the practice of determining if a message contains a hidden payload, and recovering it if possible.
Burnaev, Evgeny   +2 more
core   +1 more source

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

Research progress of color image steganalysis

open access: yes网络与信息安全学报
Traditional encrypted communication technologies have been easily detected and have struggled to meet the needs of secure communication. Steganography, capable of hiding information by modifying the carrier, has been utilized to realize covert ...
Meng XU, Xiangyang LUO, Jinwei WANG, Hao WANG
doaj   +1 more source

Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks

open access: yes, 2017
Due to the wide diffusion of JPEG coding standard, the image forensic community has devoted significant attention to the development of double JPEG (DJPEG) compression detectors through the years.
Barni, Mauro   +7 more
core   +1 more source

Home - About - Disclaimer - Privacy