Results 61 to 70 of about 3,467 (203)

Digital image steganalysis: A survey on paradigm shift from machine learning to deep learning based techniques

open access: yesIET Image Processing, 2021
Steganography, a branch of data hiding techniques aims to hide confidential information within any digital media by obscuring the existence of hidden information. On the contrary, steganalysis aims to detect steganography.
Arivazhagan Selvaraj   +3 more
doaj   +1 more source

Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication

open access: yesCAAI Transactions on Intelligence Technology, Volume 9, Issue 6, Page 1435-1450, December 2024.
Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them.
Sara Charoghchi   +2 more
wiley   +1 more source

RIHINNet: A robust image hiding method against JPEG compression based on invertible neural network

open access: yesIET Image Processing, Volume 18, Issue 13, Page 3801-3814, 13 November 2024.
The loss function is designed to hide the secret image as much as possible in the area that will not change much after JPEG compression, which is helpful to improve the robustness of the model against JPEG compression. The current image‐hiding model fails to converge when it is trained robustly for all compression quality factors. Through the design of
Xin Jin   +4 more
wiley   +1 more source

Video steganalysis scheme based on inter-frame collusion

open access: yesTongxin xuebao, 2009
An inter-frame collusion based video steganalysis scheme(ICS) was proposed by utilizing the temporal corre-lation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video se-quence decreased the ...
LIU Bin, LIU Fen-lin, YANG Chun-fang
doaj   +2 more sources

Hiding image with inception transformer

open access: yesIET Image Processing, Volume 18, Issue 13, Page 3961-3975, 13 November 2024.
In this article, we proposed a novel image steganography framework called HiiT, which takes advantage of CNN and Transformer to learn both the local and global pixel correlation in image hiding. Specifically, we propose a new Transformer structure called Inception Transformer, which incorporates the Inception Net in the attention‐based Transformer ...
Yunyun Dong   +5 more
wiley   +1 more source

Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

open access: yesIET Image Processing, Volume 18, Issue 13, Page 4189-4206, 13 November 2024.
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value.
Wassim Alexan   +5 more
wiley   +1 more source

Information hiding using approximate POSIT representation

open access: yesIET Image Processing, Volume 18, Issue 13, Page 4221-4249, 13 November 2024.
Ensure security level by hiding data using POSIT and AC at LSB of binary representation and floating‐point value to achieve higher accuracy as compared to IEEE‐754 data format and binary number representation. Enhance the security of hiding data into pixels of black/white and ARGB images by employing two options; option 1 utilizes one digit from each ...
Sa'ed Abed   +2 more
wiley   +1 more source

Calibrated Audio Steganalysis

open access: yes, 2017
7 pages, 4 figures, 3 tables, 2016 1st International Conference on New Research Achievements in Electrical and Computer Engineering, https://en.civilica.com/Paper-CBCONF01-CBCONF01_0107=Calibrated-Audio-Steganalysis ...
Ghasemzadeh, Hamzeh   +1 more
openaire   +2 more sources

Comparative Analysis of Algorithms for Detecting Hidden Information in Digital Images

open access: yesСовременные информационные технологии и IT-образование
The article provides an analysis of scientific research in the field of steganalysis of digital images, and considers the classification of steganalytic algorithms.
Andrey Bannikov, Elena Melnikova
doaj   +1 more source

Steganalysis Using Colour Model Conversion

open access: yes, 2011
arXiv admin note: substantial text overlap with arXiv:1206 ...
Thiyagarajan, P.   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy