Results 71 to 80 of about 5,168 (229)
A new set of filtering kernels are used for the preprocessing layer to facilitate the extraction of image steganographic features. While using depthwise separable convolution in this model, a new residual network block is also designed to better extract hidden information from images.
Yuanyuan Ma +5 more
wiley +1 more source
Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel +1 more
core
Network steganography conceals the transfer of sensitive information within unobtrusive data in computer networks. So-called micro protocols are communication protocols placed within the payload of a network steganographic transfer.
Keller, Jörg +3 more
core +1 more source
An Improved Near‐Reversible Technique With Residual Networks
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley +1 more source
Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy +4 more
wiley +1 more source
JPEG Image Steganography With Automatic Embedding Cost Learning
A great challenge to steganography has arisen with the wide application of steganalysis methods based on convolutional neural networks (CNNs). To this end, embedding cost learning frameworks based on generative adversarial networks (GANs) has been proposed and achieved success for spatial image steganography.
Jianhua Yang +6 more
wiley +1 more source
Leveraging High‐Dimensional Mapping for Effective JPEG Steganalysis
Steganography is a critical information‐hiding technique widely used for the covert transmission of secret information on social media. In contrast, steganalysis plays a key role in ensuring information security. Although various effective steganalysis algorithms have been proposed, existing studies typically treat color images as three independent ...
Meng Xu, Xiangyang Luo, Beijing Chen
wiley +1 more source
Steganography Defense Network Based on Simulation of Steganography Information Distribution
In order to block the spread of illegal stego‐image and reduce the erasing traces of steganography attacks on images, this paper proposes a steganography attack network based on simulation of steganography information distribution. First, a strategy of simulating steganography noise was adopted, and the distribution of steganography noise was learned ...
Jinjin Liu +5 more
wiley +1 more source
Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them.
Sara Charoghchi +2 more
wiley +1 more source
Pooled Steganalysis via Model Discrepancy
Pooled steganalysis aims to discover the guilty actor(s) among multiple normal actor(s). Existing techniques mainly rely on the high-dimension and time-consuming features.
Jiang Yu, Jing Zhang, Fengyong Li
doaj +1 more source

