Results 61 to 70 of about 6,079 (176)
Steganography, a branch of data hiding techniques aims to hide confidential information within any digital media by obscuring the existence of hidden information. On the contrary, steganalysis aims to detect steganography.
Arivazhagan Selvaraj +3 more
doaj +1 more source
Multi-resolution network based image steganalysis model
Recently, many steganalysis approaches improve their feature extraction ability through adding convolutional layers. However, it often leads to a decrease of resolution in the feature map during downsampling, which makes it challenging to extract weak ...
Zimiao Wang, Jinsong Wu
doaj +1 more source
Audio steganalysis using multi‐scale feature fusion‐based attention neural network
In this study, a new convolutional neural network for audio steganalysis, incorporating a multi‐scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. The outcome has shown that using a multi‐scale convolution method can enhance feature information for ...
Jinghui Peng, Yi Liao, Shanyu Tang
wiley +1 more source
A new set of filtering kernels are used for the preprocessing layer to facilitate the extraction of image steganographic features. While using depthwise separable convolution in this model, a new residual network block is also designed to better extract hidden information from images.
Yuanyuan Ma +5 more
wiley +1 more source
Towards Steganography Detection Through Network Traffic Visualisation
The paper presents initial step toward new network anomaly detection method that is based on traffic visualisation. The key design principle of the proposed approach is the lack of direct, linear time dependencies for the created network traffic ...
Jankowski, Bartosz +2 more
core +1 more source
An Improved Near‐Reversible Technique With Residual Networks
The study compares three cover‐image extraction subnetworks with varying residual depths, combining convolutional neural networks (CNNs) and Residual Networks (ResNets) to improve cover‐image reconstruction quality, ensuring high‐fidelity, nearly reversible reconstruction.
Tran Thi Ngoc Tin, Yih‐Chuan Lin
wiley +1 more source
Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy +4 more
wiley +1 more source
Steganalytic Methods for the Detection of Histogram Shifting Data Hiding Schemes [PDF]
Peer-reviewedIn this paper, several steganalytic techniques designed to detect the existence of hidden messages using histogram shifting schemes are presented.
Lerch Hostalot, Daniel +1 more
core
Video steganalysis scheme based on inter-frame collusion
An inter-frame collusion based video steganalysis scheme(ICS) was proposed by utilizing the temporal corre-lation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video se-quence decreased the ...
LIU Bin, LIU Fen-lin, YANG Chun-fang
doaj +2 more sources
Steganalisis digunakan untuk mendeteksi ada atau tidaknya file steganografi. Salah satu kategori steganalisis adalah blind steganalisis, yaitu cara untuk mendeteksi file rahasia tanpa mengetahui metode steganografi apa yang digunakan.
Nurmi Hidayasari +2 more
doaj +1 more source

