Results 31 to 40 of about 6,150 (193)

Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay [PDF]

open access: yesJournal of Universal Computer Science, 2019
Steganography is a promising technique for covert communications. However, illegal United States of Americage of this technique would facilitate cybercrime activities and thereby pose a great threat to information security.
Hui Tian   +5 more
doaj   +3 more sources

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning

open access: yesIEEE Access, 2019
Recently, the adaptive steganography methods have been developed to embed secret information with the minimal distortion of images. As the opposite art, steganalysis methods, especially some convolutional neural network-based steganalysis methods, have ...
Donghui Hu   +5 more
doaj   +1 more source

Sensitivity of deep learning applied to spatial image steganalysis [PDF]

open access: yesPeerJ Computer Science, 2021
In recent years, the traditional approach to spatial image steganalysis has shifted to deep learning (DL) techniques, which have improved the detection accuracy while combining feature extraction and classification in a single model, usually a ...
Reinel Tabares-Soto   +8 more
doaj   +2 more sources

About JPEG Images Parameters Impact to Steganalys Accuracy

open access: yesКібернетика та комп'ютерні технології, 2021
Introduction. Existing examples of illegal use of computer steganography prove the need for the development of stegananalytical methods and systems as one of the most important areas of cybersecurity.
N. Koshkina
doaj   +1 more source

A multi-task learning CNN for image steganalysis [PDF]

open access: yes, 2018
Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether ...
Li, Chang-Tsun   +4 more
core   +1 more source

Steganalysis Using Wavelet Transform

open access: yesJournal of Kufa for Mathematics and Computer, 2012
Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It is sometimes possible, nevertheless, to detect (but not necessarily decipher) the presence of embedded ...
Waleed . A Mahmud   +2 more
openaire   +2 more sources

Preprocessing Enhancement Method for Spatial Domain Steganalysis

open access: yesMathematics, 2022
In the field of steganalysis, in recent years, the research focus has mostly been on optimizing the structures of neural networks, while the application of high-pass filters is still limited to the simple selection of filters and simple adjustment of the
Xueming Duan   +3 more
doaj   +1 more source

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

IAS-CNN: Image adaptive steganalysis via convolutional neural network combined with selection channel

open access: yesInternational Journal of Distributed Sensor Networks, 2020
Steganography is conducive to communication security, but the abuse of steganography brings many potential dangers. And then, steganalysis plays an important role in preventing the abuse of steganography.
Zhujun Jin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy