Results 61 to 70 of about 6,079 (176)

Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning based techniques

open access: yesIET Image Processing, 2021
Steganography, a branch of data hiding techniques aims to hide confidential information within any digital media by obscuring the existence of hidden information. On the contrary, steganalysis aims to detect steganography.
Arivazhagan Selvaraj   +3 more
doaj   +1 more source

Multi-resolution network based image steganalysis model

open access: yesIntelligent and Converged Networks, 2023
Recently, many steganalysis approaches improve their feature extraction ability through adding convolutional layers. However, it often leads to a decrease of resolution in the feature map during downsampling, which makes it challenging to extract weak ...
Zimiao Wang, Jinsong Wu
doaj   +1 more source

Audio steganalysis using multi‐scale feature fusion‐based attention neural network

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley   +1 more source

LGS‐Net: A lightweight convolutional neural network based on global feature capture for spatial image steganalysis

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
A new set of filtering kernels are used for the preprocessing layer to facilitate the extraction of image steganographic features. While using depthwise separable convolution in this model, a new residual network block is also designed to better extract hidden information from images.
Yuanyuan Ma   +5 more
wiley   +1 more source

Towards Steganography Detection Through Network Traffic Visualisation

open access: yes, 2012
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz   +2 more
core   +1 more source

An Improved Near‐Reversible Technique With Residual Networks

open access: yesIET Image Processing, Volume 19, Issue 1, January/December 2025.
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley   +1 more source

Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication

open access: yesIET Quantum Communication, Volume 6, Issue 1, January/December 2025.
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy   +4 more
wiley   +1 more source

Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]

open access: yes, 2012
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel   +1 more
core  

Video steganalysis scheme based on inter-frame collusion

open access: yesTongxin xuebao, 2009
An inter-frame collusion based video steganalysis scheme(ICS) was proposed by utilizing the temporal corre-lation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video se-quence decreased the ...
LIU Bin, LIU Fen-lin, YANG Chun-fang
doaj   +2 more sources

Steganalisis Blind dengan Metode Convolutional Neural Network (CNN) Yedroudj- Net terhadap Tools Steganografi

open access: yesJurnal Teknologi Informasi dan Ilmu Komputer, 2020
Steganalisis digunakan untuk mendeteksi ada atau tidaknya file steganografi. Salah satu kategori steganalisis adalah blind steganalisis, yaitu cara untuk mendeteksi file rahasia tanpa mengetahui metode steganografi apa yang digunakan.
Nurmi Hidayasari   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy