Results 21 to 30 of about 3,326 (205)

Locating secret messages based on quantitative steganalysis

open access: yesMathematical Biosciences and Engineering, 2019
Steganography poses a serious challenge to forensics because investigators cannot identify even traces of secret messages embedded using a steganographer.
Chunfang Yang   +4 more
doaj   +1 more source

Quantized Gaussian JPEG Steganography and Pool Steganalysis

open access: yesIEEE Access, 2022
Currently, algorithms for compressed image steganography mainly embed hidden message by minimizing the resulting distortion or statistical detectability.
Mohammed Aloraini   +2 more
doaj   +1 more source

Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2020
Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information.
Muh Hajar Akbar   +2 more
doaj   +1 more source

Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay [PDF]

open access: yesJournal of Universal Computer Science, 2019
Steganography is a promising technique for covert communications. However, illegal United States of Americage of this technique would facilitate cybercrime activities and thereby pose a great threat to information security.
Hui Tian   +5 more
doaj   +3 more sources

Spatial Steganalysis Based on Non-Local Block and Multi-Channel Convolutional Networks

open access: yesIEEE Access, 2022
Image steganalysis aims to detect whether secret information is hidden in images and is a means to solve the communication security. Recently, a series of convolutional neural network-based steganalysis models has been proposed and has achieved ...
Xu Han, Tao Zhang
doaj   +1 more source

Cover-aware Steganalysis

open access: yesJournal of Cyber Security and Mobility, 2021
The increasing digitization offers new ways, possibilities and needs for a secure transmission of information. Steganography and its analysis constitute an essential part of IT-Security. In this work we show how methods of blind-steganalysis can be improved to work in cover-aware scenarios, we will call this non-blind steganalysis.
Niklas Bunzel   +2 more
openaire   +3 more sources

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning

open access: yesIEEE Access, 2019
Recently, the adaptive steganography methods have been developed to embed secret information with the minimal distortion of images. As the opposite art, steganalysis methods, especially some convolutional neural network-based steganalysis methods, have ...
Donghui Hu   +5 more
doaj   +1 more source

IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography.
Zhujun Jin   +3 more
doaj   +1 more source

Steganalysis of Chat based Steganography

open access: yesInternational Journal of Informatics and Applied Mathematics, 2023
Steganalysis is the practice of identifying potential secret communication and taking appropriate action, such as deciphering to uncover the hidden contents or destroying the object containing the hidden information if it cannot be uncovered. At times, it’s very necessary to perform Steganalysis due to the fact that steganography is often ...
openaire   +2 more sources

Preprocessing Enhancement Method for Spatial Domain Steganalysis

open access: yesMathematics, 2022
In the field of steganalysis, in recent years, the research focus has mostly been on optimizing the structures of neural networks, while the application of high-pass filters is still limited to the simple selection of filters and simple adjustment of the
Xueming Duan   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy