Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
Deep learning for diverse data types steganalysis: A review
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …
A convolutional neural network to detect possible hidden data in spatial domain images
JDLC Ntivuguruzwa, T Ahmad - Cybersecurity, 2023 - Springer
Hiding secret data in digital multimedia has been essential to protect the data. Nevertheless,
attackers with a steganalysis technique may break them. Existing steganalysis methods …
attackers with a steganalysis technique may break them. Existing steganalysis methods …
Enhancing Secret Data Detection Using Convolutional Neural Networks with Fuzzy Edge Detection
Progress in Deep Learning (DL) has introduced alternative methods for tackling complex
challenges, such as the steganalysis of spatial domain images, where Convolutional Neural …
challenges, such as the steganalysis of spatial domain images, where Convolutional Neural …
Dense D2C-Net: dense connection network for display-to-camera communications
In this paper, we introduce a novel Dense D2C-Net, an unobtrusive display-to-camera (D2C)
communication scheme that embeds and extracts additional data via visual content through …
communication scheme that embeds and extracts additional data via visual content through …
Efficiency of Identification of Blackcurrant Powders Using Classifier Ensembles
K Przybył, K Walkowiak, PŁ Kowalczewski - Foods, 2024 - mdpi.com
In the modern times of technological development, it is important to select adequate
methods to support various food and industrial problems, including innovative techniques …
methods to support various food and industrial problems, including innovative techniques …
Revealing MageCart-like threats in favicons via artificial intelligence
Modern malware increasingly takes advantage of information hiding to avoid detection,
spread infections, and obfuscate code. A major offensive strategy exploits steganography to …
spread infections, and obfuscate code. A major offensive strategy exploits steganography to …
An Ensemble Transfer Learning Model for Detecting Stego Images
As internet traffic grows daily, so does the need to protect it. Network security protects data
from unauthorized access and ensures their confidentiality and integrity. Steganography is …
from unauthorized access and ensures their confidentiality and integrity. Steganography is …
[PDF][PDF] Detection of steganographic threats targeting digital images in heterogeneous ecosystems through machine learning
Steganography is increasingly exploited by malware to avoid detection and to implement
different advanced offensive schemes. An attack paradigm expected to become widely used …
different advanced offensive schemes. An attack paradigm expected to become widely used …
Cybersecurity and data science
K Szczypiorski - Electronics, 2022 - mdpi.com
Towards the end of the Cold War in 1985, in reference to the theory of leadership for the first
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …