Results 31 to 40 of about 3,326 (205)

About JPEG Images Parameters Impact to Steganalys Accuracy

open access: yesКібернетика та комп'ютерні технології, 2021
Introduction. Existing examples of illegal use of computer steganography prove the need for the development of stegananalytical methods and systems as one of the most important areas of cybersecurity.
N. Koshkina
doaj   +1 more source

Steganalysis in resized images [PDF]

open access: yes2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013
It is well known that the security of a given steganographic algorithm strongly depends on the statistical properties of the cover source. In this paper, we study how downsampling affects steganographic security. The secure payload no longer scales according to the square-root law because resizing changes the statistical properties of the cover source.
Jan Kodovsky, Jessica Fridrich
openaire   +2 more sources

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil   +4 more
wiley   +1 more source

SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis

open access: yesIET Image Processing, 2023
The steganalysis for JPEG image is an important research topic, as the enormous popularity of JPEG image on Internet. However, the stego noise feature extraction process of the existing deep learning‐based steganalytic methods are not adaptive enough to ...
Wentong Fan   +4 more
doaj   +1 more source

Exploring the Grammatical Complexity of International Teaching Assistants: A Comparative Corpus Study

open access: yesTESOL Quarterly, Volume 59, Issue 2, Page 874-906, June 2025.
Abstract The purpose of this study is to analyze the grammatical complexity features of international teaching assistants' (ITAs) mock‐teaching presentations and to compare the distributions of these features to those found in the Oral English Proficiency Test (a local ITA assessment), university classroom teaching, conversation, and academic writing ...
Heesun Chang, Amin Raeisi‐Vanani
wiley   +1 more source

Wavelet‐Based Texture Mining and Enhancement for Face Forgery Detection

open access: yesIET Biometrics, Volume 2025, Issue 1, 2025.
Due to the abuse of deep forgery technology, the research on forgery detection methods has become increasingly urgent. The corresponding relationship between the frequency spectrum information and the spatial clues, which is often neglected by current methods, could be conducive to a more accurate and generalized forgery detection.
Xin Li   +4 more
wiley   +1 more source

Research progress of color image steganalysis

open access: yes网络与信息安全学报
Traditional encrypted communication technologies have been easily detected and have struggled to meet the needs of secure communication. Steganography, capable of hiding information by modifying the carrier, has been utilized to realize covert ...
Meng XU, Xiangyang LUO, Jinwei WANG, Hao WANG
doaj   +1 more source

Steganalysis of AMR Speech Based on Multiple Classifiers Combination

open access: yesIEEE Access, 2019
In this paper, we focus on steganalysis in adaptive multi-rate (AMR) speech streams, whose goal is to detect covert communication behaviors effectively to prevent illegal uses of AMR steganography.
Hui Tian   +4 more
doaj   +1 more source

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

Home - About - Disclaimer - Privacy