Results 1 to 10 of about 3,326 (205)

Lightweight image steganalysis with block-wise pruning [PDF]

open access: yesScientific Reports, 2023
Image steganalysis is the task of detecting a secret message hidden in an image. Deep steganalysis using end-to-end deep learning has been successful in recent years, but previous studies focused on improving detection performance rather than designing a
Eungi Hong   +3 more
doaj   +2 more sources

Progressive Randomization for Steganalysis [PDF]

open access: green2006 IEEE Workshop on Multimedia Signal Processing, 2006
In this paper, we describe a new methodology to detect the presence of hidden digital content in the Least Significant Bits (LSB) of images. We introduce the Progressive Randomization (PR) technique that captures statistical artifacts inserted during the hiding process.
Anderson Rocha, Siome Goldenstein
openalex   +3 more sources

Steganography and Steganalysis in Voice over IP: A Review [PDF]

open access: yesSensors, 2021
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu   +3 more
doaj   +2 more sources

A comprehensive review of video steganalysis [PDF]

open access: yesIET Image Processing, 2022
Steganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms
Mourad Bouzegza   +3 more
doaj   +2 more sources

Efficient steganalysis using convolutional auto encoder network to ensure original image quality [PDF]

open access: yesPeerJ Computer Science, 2021
Steganalysis is the process of analyzing and predicting the presence of hidden information in images. Steganalysis would be most useful to predict whether the received images contain useful information. However, it is more difficult to predict the hidden
Mallikarjuna Reddy Ayaluri   +3 more
doaj   +3 more sources

Digital image steganalysis network strengthening framework based on evolutionary algorithm [PDF]

open access: yesScientific Reports
To solve the problem of increasing network parameters and increasing fitting fluctuation during training due to the improvement or expansion of image steganalysis network, a framework for strengthening steganalysis network was considered.
Yuanyuan Ma   +5 more
doaj   +2 more sources

The ALASKA Steganalysis Challenge [PDF]

open access: greenProceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
This paper presents ins and outs of the ALASKA challenge, a steganalysis challenge built to reflect the constraints of a forensic steganalyst. We motivate and explain the main differences w.r.t. the BOSS challenge (2010), specifically the use of a ranking metric prescribing high false positive rates, the analysis of a large diversity of different image
Rémi Cogranne   +2 more
openalex   +4 more sources

Sensitivity of deep learning applied to spatial image steganalysis [PDF]

open access: yesPeerJ Computer Science, 2021
In recent years, the traditional approach to spatial image steganalysis has shifted to deep learning (DL) techniques, which have improved the detection accuracy while combining feature extraction and classification in a single model, usually a ...
Reinel Tabares-Soto   +8 more
doaj   +3 more sources

Digital Image Steganalysis: Current Methodologies and Future Challenges

open access: yesIEEE Access, 2022
With the growing use of the internet and social media, data security has become a major issue. Thus, researchers are focusing on data security techniques such as steganography and steganalysis. Steganography is the approach of concealing the existence of
Wafa M. Eid   +3 more
doaj   +1 more source

Color image steganalysis based on quaternion discrete cosine transform

open access: yesElectronic Research Archive, 2023
With the rapid development and application of Internet technology in recent years, the issue of information security has received more and more attention.
Meng Xu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy