Results 1 to 10 of about 3,467 (203)

Comprehensive Criteria-Based Generalized Steganalysis Feature Selection Method [PDF]

open access: goldIEEE Access, 2020
Redundant steganalysis feature components in high-dimensional steganalysis feature of images increase the spatio-temporal complexity of steganalysis and even reduce the detection accuracy of the stego images.
Yihao Wang   +4 more
doaj   +2 more sources

Lightweight image steganalysis with block-wise pruning [PDF]

open access: yesScientific Reports, 2023
Image steganalysis is the task of detecting a secret message hidden in an image. Deep steganalysis using end-to-end deep learning has been successful in recent years, but previous studies focused on improving detection performance rather than designing a
Eungi Hong   +3 more
doaj   +2 more sources

Extensible Steganalysis via Continual Learning

open access: yesFractal and Fractional, 2022
To realize secure communication, steganography is usually implemented by embedding secret information into an image selected from a natural image dataset, in which the fractal images have occupied a considerable proportion.
Zhili Zhou   +3 more
doaj   +4 more sources

Digital image steganalysis network strengthening framework based on evolutionary algorithm [PDF]

open access: yesScientific Reports
To solve the problem of increasing network parameters and increasing fitting fluctuation during training due to the improvement or expansion of image steganalysis network, a framework for strengthening steganalysis network was considered.
Yuanyuan Ma   +5 more
doaj   +2 more sources

Improvement of convolutional neural network structure for image steganalysis [PDF]

open access: yesJisuanji gongcheng, 2018
Aiming at the situation that the accuracy of image steganalysis is not high,a steganalysis model of Convolutional Neural Network(CNN) based on Multi-layer percepual convolution layer(Mlpconv) is constructed.The model uses multi-layer perceptual ...
GAO Peixian,WEI Lixian,LIU Jia
doaj   +1 more source

Digital Image Steganalysis: Current Methodologies and Future Challenges

open access: yesIEEE Access, 2022
With the growing use of the internet and social media, data security has become a major issue. Thus, researchers are focusing on data security techniques such as steganography and steganalysis. Steganography is the approach of concealing the existence of
Wafa M. Eid   +3 more
doaj   +1 more source

Color image steganalysis based on quaternion discrete cosine transform

open access: yesElectronic Research Archive, 2023
With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention.
Meng Xu   +3 more
doaj   +1 more source

Efficient steganalysis using convolutional auto encoder network to ensure original image quality [PDF]

open access: yesPeerJ Computer Science, 2021
Steganalysis is the process of analyzing and predicting the presence of hidden information in images. Steganalysis would be most useful to predict whether the received images contain useful information. However, it is more difficult to predict the hidden
Mallikarjuna Reddy Ayaluri   +3 more
doaj   +2 more sources

Image steganalysis feature selection based on the improved Fisher criterion

open access: yesMathematical Biosciences and Engineering, 2020
In order to improve the detection accuracy of hidden message in images, steganalysis features are selected as inputs for steganalysers. However, the existing Fisher criterion ignores the contribution of steganalysis feature components in dispersion to ...
Yuanyuan Ma
doaj   +1 more source

Cover-aware Steganalysis

open access: yesJournal of Cyber Security and Mobility, 2021
The increasing digitization offers new ways, possibilities and needs for a secure transmission of information. Steganography and its analysis constitute an essential part of IT-Security. In this work we show how methods of blind-steganalysis can be improved to work in cover-aware scenarios, we will call this non-blind steganalysis.
Niklas Bunzel   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy