Results 81 to 90 of about 3,467 (203)

Stego-Image Synthesis Employing Data-Driven Continuous Variable Representations of Cover Images

open access: yesIEEE Access
The security of stego-images is a crucial foundation for analyzing steganography algorithms. Recently, steganography has made significant strides in ongoing conflicts with steganalysis.
Saleh Naif Almuayqil   +4 more
doaj   +1 more source

Toward Hybrid Classical Deep Learning-Quantum Methods for Steganalysis

open access: yesIEEE Access
This paper explores the potential of the hybrid classical deep learning quantum in addressing contemporary information security challenges, including cyber-attack detection and prevention, botnet detection, IP-theft, hardware defect detection, and more ...
Rini Wisnu Wardhani   +4 more
doaj   +1 more source

A Deep Learning Driven Feature Based Steganalysis Approach [PDF]

open access: hybrid, 2023
Yuchen Li   +4 more
openalex   +1 more source

Pooled Steganalysis via Model Discrepancy

open access: yesMathematics
Pooled steganalysis aims to discover the guilty actor(s) among multiple normal actor(s). Existing techniques mainly rely on the high-dimension and time-consuming features.
Jiang Yu, Jing Zhang, Fengyong Li
doaj   +1 more source

Steganalysis of stegostorage system

open access: green, 2015
Michala Gulášová, Matúš Jókay
openalex   +2 more sources

Blind Color Image Steganalysis Based on Multi-Transform Combined Features Selected by a Hybrid of ANOVA and BPSO

open access: yesInternational Journal of Information and Communication Technology Research, 2010
Steganalysis techniques have been classified into two major categories: blind steganalysis which is independent of the steganography method and specific steganalysis which attempts to detect specific steganographic media.
Mansoureh Pezhmanpour   +2 more
doaj  

Home - About - Disclaimer - Privacy