Results 41 to 50 of about 6,079 (176)
AGFP: A Deep Attention‐Guided Framework for DWT‐Based Image Steganography
This paper introduces Attention‐Guided Feature Perturbation (AGFP), a novel framework that combines deep learning‐based attention mechanisms with Discrete Wavelet Transform (DWT) embedding for image steganography. By selectively embedding data in perceptually and statistically safe regions, AGFP achieves high imperceptibility, robustness against ...
Taner Cevik +5 more
wiley +1 more source
Unsupervised Steganalysis Based on Artificial Training Sets
In this paper, an unsupervised steganalysis method that combines artificial training setsand supervised classification is proposed. We provide a formal framework for unsupervisedclassification of stego and cover images in the typical situation of ...
Lerch-Hostalot, Daniel, Megías, David
core +1 more source
Color image steganalysis based on channel gradient correlation
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the ...
Yuhan Kang +5 more
doaj +1 more source
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal +2 more
wiley +1 more source
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig +46 more
core +1 more source
Research progress of color image steganalysis
Traditional encrypted communication technologies have been easily detected and have struggled to meet the needs of secure communication. Steganography, capable of hiding information by modifying the carrier, has been utilized to realize covert ...
Meng XU, Xiangyang LUO, Jinwei WANG, Hao WANG
doaj +1 more source
Detecting Deepfakes Using Two‐Stream Framework Based on EfficientNet and Vision Transformer
The ever‐growing threat of deepfake technology has stimulated research in deepfake forensics to identify the genuineness of media materials on the Internet. The majority of existing techniques employ the convolutional neural network (CNN) framework to identify deepfake by capturing the image’s local features.
Qiang Yang +4 more
wiley +1 more source
DNA Steganalysis Using Deep Recurrent Neural Networks
Recent advances in next-generation sequencing technologies have facilitated the use of deoxyribonucleic acid (DNA) as a novel covert channels in steganography.
Bae, Ho +3 more
core +1 more source
New Approach on Steganalysis [PDF]
Recently, steganography tools for concealing messages in images have been widely used, and internal mechanisms for hiding messages using steganography tools are mostly unknown to public. Therefore, we adopted the reverse engineering for unveiling the information hiding algorithm and operation mechanism applied to 'Steg' steganography software using IDA
Hanseong Lee, Hyung-Woo Lee
openaire +1 more source
Abstract The spread of image editing tools demonstrates how modern mixed‐media technology enables changes in digital images. Such easy access raises severe moral and legal concerns around the potential for malicious image editing. Overcoming this difficulty will need the development of innovative approaches for the quick detection of changes in high ...
Arslan Akram +4 more
wiley +1 more source

