Results 11 to 20 of about 3,467 (203)

Neural Linguistic Steganalysis via Multi-Head Self-Attention [PDF]

open access: goldJournal of Electrical and Computer Engineering, 2021
Linguistic steganalysis can indicate the existence of steganographic content in suspicious text carriers. Precise linguistic steganalysis on suspicious carrier is critical for multimedia security.
Sai-Mei Jiao   +3 more
doaj   +2 more sources

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning [PDF]

open access: goldIEEE Access, 2019
Recently, the adaptive steganography methods have been developed to embed secret information with the minimal distortion of images. As the opposite art, steganalysis methods, especially some convolutional neural network-based steganalysis methods, have ...
Donghui Hu   +5 more
doaj   +2 more sources

Audio steganalysis using multi‐scale feature fusion‐based attention neural network [PDF]

open access: goldIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +2 more sources

A Low Cost Image Steganalysis by Using Domain Adaptation

open access: greenInternational Journal of Information Science and Management, 2018
Information hiding and data encryption are used widely to protect data and information from anonymous access. In digital world, hiding and encrypting of the desired data into an image is a smart way to protect information with a low cost.
Mohammd Bagher Dastgheib   +2 more
doaj   +1 more source

Image steganalysis using active learning and hyperparameter optimization. [PDF]

open access: goldSci Rep
Bohang L   +9 more
europepmc   +3 more sources

Steganography and Steganalysis in Voice over IP: A Review

open access: yesSensors, 2021
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu   +3 more
doaj   +1 more source

A New Convolutional Neural Network-Based Steganalysis Method for Content-Adaptive Image Steganography in the Spatial Domain

open access: yesIEEE Access, 2020
Convolutional neural network-based methods are attracting increasing attention in steganalysis. However, steganalysis for content-adaptive image steganography in the spatial domain is still a difficult problem.
Zhili Xiang   +5 more
doaj   +1 more source

Steganalysis of Compressed Speech Based on Global and Local Correlation Mining

open access: yesIEEE Access, 2022
Most of the existing steganalysis methods are designed for specific steganography methods in low-bit-rate compressed speech stream and lack of generalization ability.
Jiawei Wang   +3 more
doaj   +1 more source

Steganalysis of transcoding steganography [PDF]

open access: yesannals of telecommunications - annales des télécommunications, 2013
13 pages, 7 figures, 2 ...
Janicki, Artur   +2 more
openaire   +2 more sources

Secure Cover Selection for Steganography

open access: yesIEEE Access, 2019
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis,
Zichi Wang, Xinpeng Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy