Results 41 to 50 of about 6,079 (176)

AGFP: A Deep Attention‐Guided Framework for DWT‐Based Image Steganography

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper introduces Attention‐Guided Feature Perturbation (AGFP), a novel framework that combines deep learning‐based attention mechanisms with Discrete Wavelet Transform (DWT) embedding for image steganography. By selectively embedding data in perceptually and statistically safe regions, AGFP achieves high imperceptibility, robustness against ...
Taner Cevik   +5 more
wiley   +1 more source

Unsupervised Steganalysis Based on Artificial Training Sets

open access: yes, 2016
In this paper, an unsupervised steganalysis method that combines artificial training setsand supervised classification is proposed. We provide a formal framework for unsupervisedclassification of stego and cover images in the typical situation of ...
Lerch-Hostalot, Daniel, Megías, David
core   +1 more source

Color image steganalysis based on channel gradient correlation

open access: yesInternational Journal of Distributed Sensor Networks, 2019
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the ...
Yuhan Kang   +5 more
doaj   +1 more source

A Novel Image Steganographic Method Based on Enhanced PIWT and Modified Optimal Pixel Adjustment Process

open access: yesIET Image Processing, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel image steganographic method based on an enhanced Pyramid Integer Wavelet Transform (PIWT) combined with a Modified Optimal Pixel Adjustment Process (MOPAP). The PIWT enables integer‐to‐integer transformation, avoiding floating‐point computations and improving its suitability for efficient implementation.
Ali Yahya Al‐Ashwal   +2 more
wiley   +1 more source

Steganographer Identification

open access: yes, 2019
Conventional steganalysis detects the presence of steganography within single objects. In the real-world, we may face a complex scenario that one or some of multiple users called actors are guilty of using steganography, which is typically defined as the
Breunig   +46 more
core   +1 more source

Research progress of color image steganalysis

open access: yes网络与信息安全学报
Traditional encrypted communication technologies have been easily detected and have struggled to meet the needs of secure communication. Steganography, capable of hiding information by modifying the carrier, has been utilized to realize covert ...
Meng XU, Xiangyang LUO, Jinwei WANG, Hao WANG
doaj   +1 more source

Detecting Deepfakes Using Two‐Stream Framework Based on EfficientNet and Vision Transformer

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
The ever‐growing threat of deepfake technology has stimulated research in deepfake forensics to identify the genuineness of media materials on the Internet. The majority of existing techniques employ the convolutional neural network (CNN) framework to identify deepfake by capturing the image’s local features.
Qiang Yang   +4 more
wiley   +1 more source

DNA Steganalysis Using Deep Recurrent Neural Networks

open access: yes, 2018
Recent advances in next-generation sequencing technologies have facilitated the use of deoxyribonucleic acid (DNA) as a novel covert channels in steganography.
Bae, Ho   +3 more
core   +1 more source

New Approach on Steganalysis [PDF]

open access: yesProceedings of the 2020 9th International Conference on Software and Computer Applications, 2020
Recently, steganography tools for concealing messages in images have been widely used, and internal mechanisms for hiding messages using steganography tools are mostly unknown to public. Therefore, we adopted the reverse engineering for unveiling the information hiding algorithm and operation mechanism applied to 'Steg' steganography software using IDA
Hanseong Lee, Hyung-Woo Lee
openaire   +1 more source

Enhanced image‐splicing classification: A resilient and scale‐invariant approach utilizing edge‐weighted local texture features

open access: yesJournal of Forensic Sciences, Volume 70, Issue 6, Page 2297-2308, November 2025.
Abstract The spread of image editing tools demonstrates how modern mixed‐media technology enables changes in digital images. Such easy access raises severe moral and legal concerns around the potential for malicious image editing. Overcoming this difficulty will need the development of innovative approaches for the quick detection of changes in high ...
Arslan Akram   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy