Results 21 to 30 of about 6,079 (176)

Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay [PDF]

open access: yesJournal of Universal Computer Science, 2019
Steganography is a promising technique for covert communications. However, illegal United States of Americage of this technique would facilitate cybercrime activities and thereby pose a great threat to information security.
Hui Tian   +5 more
doaj   +3 more sources

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning

open access: yesIEEE Access, 2019
Recently, the adaptive steganography methods have been developed to embed secret information with the minimal distortion of images. As the opposite art, steganalysis methods, especially some convolutional neural network-based steganalysis methods, have ...
Donghui Hu   +5 more
doaj   +1 more source

Sensitivity of deep learning applied to spatial image steganalysis [PDF]

open access: yesPeerJ Computer Science, 2021
In recent years, the traditional approach to spatial image steganalysis has shifted to deep learning (DL) techniques, which have improved the detection accuracy while combining feature extraction and classification in a single model, usually a ...
Reinel Tabares-Soto   +8 more
doaj   +2 more sources

About JPEG Images Parameters Impact to Steganalys Accuracy

open access: yesКібернетика та комп'ютерні технології, 2021
Introduction. Existing examples of illegal use of computer steganography prove the need for the development of stegananalytical methods and systems as one of the most important areas of cybersecurity.
N. Koshkina
doaj   +1 more source

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

Spatial Steganalysis Based on Non-Local Block and Multi-Channel Convolutional Networks

open access: yesIEEE Access, 2022
Image steganalysis aims to detect whether secret information is hidden in images and is a means to solve the communication security. Recently, a series of convolutional neural network-based steganalysis models has been proposed and has achieved ...
Xu Han, Tao Zhang
doaj   +1 more source

IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography.
Zhujun Jin   +3 more
doaj   +1 more source

Steganalysis Using Wavelet Transform

open access: yesJournal of Kufa for Mathematics and Computer, 2012
Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It is sometimes possible, nevertheless, to detect (but not necessarily decipher) the presence of embedded ...
Waleed . A Mahmud   +2 more
openaire   +2 more sources

Preprocessing Enhancement Method for Spatial Domain Steganalysis

open access: yesMathematics, 2022
In the field of steganalysis, in recent years, the research focus has mostly been on optimizing the structures of neural networks, while the application of high-pass filters is still limited to the simple selection of filters and simple adjustment of the
Xueming Duan   +3 more
doaj   +1 more source

Deep Convolutional Neural Network to Detect J-UNIWARD

open access: yes, 2017
This paper presents an empirical study on applying convolutional neural networks (CNNs) to detecting J-UNIWARD, one of the most secure JPEG steganographic method.
Ioffe Sergey   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy