Results 41 to 50 of about 3,467 (203)

Enhanced image‐splicing classification: A resilient and scale‐invariant approach utilizing edge‐weighted local texture features

open access: yesJournal of Forensic Sciences, Volume 70, Issue 6, Page 2297-2308, November 2025.
Abstract The spread of image editing tools demonstrates how modern mixed‐media technology enables changes in digital images. Such easy access raises severe moral and legal concerns around the potential for malicious image editing. Overcoming this difficulty will need the development of innovative approaches for the quick detection of changes in high ...
Arslan Akram   +4 more
wiley   +1 more source

An adaptive block‐wise prediction error‐based (AdaBPE) reversible data hiding in encrypted images for medical image transmission

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1269-1290, October 2025.
Abstract Life expectancy has improved with new‐age technologies and advancements in the healthcare sector. Though artificial intelligence (AI) and the Internet of Things (IoT) are revolutionising smart healthcare systems, security of the healthcare data is always a concern.
Shaiju Panchikkil   +4 more
wiley   +1 more source

SNENet: An adaptive stego noise extraction network using parallel dilated convolution for JPEG image steganalysis

open access: yesIET Image Processing, 2023
The steganalysis for JPEG image is an important research topic, as the enormous popularity of JPEG image on Internet. However, the stego noise feature extraction process of the existing deep learning‐based steganalytic methods are not adaptive enough to ...
Wentong Fan   +4 more
doaj   +1 more source

New Approach on Steganalysis [PDF]

open access: yesProceedings of the 2020 9th International Conference on Software and Computer Applications, 2020
Recently, steganography tools for concealing messages in images have been widely used, and internal mechanisms for hiding messages using steganography tools are mostly unknown to public. Therefore, we adopted the reverse engineering for unveiling the information hiding algorithm and operation mechanism applied to 'Steg' steganography software using IDA
Hanseong Lee, Hyung-Woo Lee
openaire   +1 more source

RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 5, Page 1422-1445, October 2025.
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy   +3 more
wiley   +1 more source

Steganalysis of AMR Speech Based on Multiple Classifiers Combination

open access: yesIEEE Access, 2019
In this paper, we focus on steganalysis in adaptive multi-rate (AMR) speech streams, whose goal is to detect covert communication behaviors effectively to prevent illegal uses of AMR steganography.
Hui Tian   +4 more
doaj   +1 more source

Exploring the Grammatical Complexity of International Teaching Assistants: A Comparative Corpus Study

open access: yesTESOL Quarterly, Volume 59, Issue 2, Page 874-906, June 2025.
Abstract The purpose of this study is to analyze the grammatical complexity features of international teaching assistants' (ITAs) mock‐teaching presentations and to compare the distributions of these features to those found in the Oral English Proficiency Test (a local ITA assessment), university classroom teaching, conversation, and academic writing ...
Heesun Chang, Amin Raeisi‐Vanani
wiley   +1 more source

Research progress of color image steganalysis

open access: yes网络与信息安全学报
Traditional encrypted communication technologies have been easily detected and have struggled to meet the needs of secure communication. Steganography, capable of hiding information by modifying the carrier, has been utilized to realize covert ...
Meng XU, Xiangyang LUO, Jinwei WANG, Hao WANG
doaj   +1 more source

Wavelet‐Based Texture Mining and Enhancement for Face Forgery Detection

open access: yesIET Biometrics, Volume 2025, Issue 1, 2025.
Due to the abuse of deep forgery technology, the research on forgery detection methods has become increasingly urgent. The corresponding relationship between the frequency spectrum information and the spatial clues, which is often neglected by current methods, could be conducive to a more accurate and generalized forgery detection.
Xin Li   +4 more
wiley   +1 more source

Color image steganalysis based on channel gradient correlation

open access: yesInternational Journal of Distributed Sensor Networks, 2019
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the ...
Yuhan Kang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy