Results 61 to 70 of about 4,115 (191)

Research progress of color image steganalysis

open access: yes网络与信息安全学报
Traditional encrypted communication technologies have been easily detected and have struggled to meet the needs of secure communication. Steganography, capable of hiding information by modifying the carrier, has been utilized to realize covert ...
Meng XU, Xiangyang LUO, Jinwei WANG, Hao WANG
doaj   +1 more source

Micro protocol engineering for unstructured carriers: On the embedding of steganographic control protocols into audio transmissions

open access: yes, 2015
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg   +3 more
core   +1 more source

Exploring the Grammatical Complexity of International Teaching Assistants: A Comparative Corpus Study

open access: yesTESOL Quarterly, Volume 59, Issue 2, Page 874-906, June 2025.
Abstract The purpose of this study is to analyze the grammatical complexity features of international teaching assistants' (ITAs) mock‐teaching presentations and to compare the distributions of these features to those found in the Oral English Proficiency Test (a local ITA assessment), university classroom teaching, conversation, and academic writing ...
Heesun Chang, Amin Raeisi‐Vanani
wiley   +1 more source

Wavelet‐Based Texture Mining and Enhancement for Face Forgery Detection

open access: yesIET Biometrics, Volume 2025, Issue 1, 2025.
Due to the abuse of deep forgery technology, the research on forgery detection methods has become increasingly urgent. The corresponding relationship between the frequency spectrum information and the spatial clues, which is often neglected by current methods, could be conducive to a more accurate and generalized forgery detection.
Xin Li   +4 more
wiley   +1 more source

Aligned and Non-Aligned Double JPEG Detection Using Convolutional Neural Networks

open access: yes, 2017
Due to the wide diffusion of JPEG coding standard, the image forensic community has devoted significant attention to the development of double JPEG (DJPEG) compression detectors through the years.
Barni, Mauro   +7 more
core   +1 more source

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]

open access: yes, 2012
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel   +1 more
core  

LGS‐Net: A lightweight convolutional neural network based on global feature capture for spatial image steganalysis

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
A new set of filtering kernels are used for the preprocessing layer to facilitate the extraction of image steganographic features. While using depthwise separable convolution in this model, a new residual network block is also designed to better extract hidden information from images.
Yuanyuan Ma   +5 more
wiley   +1 more source

An Improved Near‐Reversible Technique With Residual Networks

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley   +1 more source

A Low Cost Image Steganalysis by Using Domain Adaptation

open access: yesInternational Journal of Information Science and Management, 2018
Information hiding and data encryption are used widely to protect data and information from anonymous access. In digital world, hiding and encrypting of the desired data into an image is a smart way to protect information with a low cost.
Mohammd Bagher Dastgheib   +2 more
doaj  

Home - About - Disclaimer - Privacy