Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

A convolutional neural network to detect possible hidden data in spatial domain images

JDLC Ntivuguruzwa, T Ahmad - Cybersecurity, 2023 - Springer
Hiding secret data in digital multimedia has been essential to protect the data. Nevertheless,
attackers with a steganalysis technique may break them. Existing steganalysis methods …

Enhancing Secret Data Detection Using Convolutional Neural Networks with Fuzzy Edge Detection

NJ De La Croix, T Ahmad, F Han - IEEE Access, 2023 - ieeexplore.ieee.org
Progress in Deep Learning (DL) has introduced alternative methods for tackling complex
challenges, such as the steganalysis of spatial domain images, where Convolutional Neural …

Dense D2C-Net: dense connection network for display-to-camera communications

N Maharjan, LD Tamang, BW Kim - Optics Express, 2023 - opg.optica.org
In this paper, we introduce a novel Dense D2C-Net, an unobtrusive display-to-camera (D2C)
communication scheme that embeds and extracts additional data via visual content through …

Efficiency of Identification of Blackcurrant Powders Using Classifier Ensembles

K Przybył, K Walkowiak, PŁ Kowalczewski - Foods, 2024 - mdpi.com
In the modern times of technological development, it is important to select adequate
methods to support various food and industrial problems, including innovative techniques …

Revealing MageCart-like threats in favicons via artificial intelligence

M Guarascio, M Zuppelli, N Cassavia… - Proceedings of the 17th …, 2022 - dl.acm.org
Modern malware increasingly takes advantage of information hiding to avoid detection,
spread infections, and obfuscate code. A major offensive strategy exploits steganography to …

An Ensemble Transfer Learning Model for Detecting Stego Images

DY Mikhail, RS Hawezi, SW Kareem - Applied Sciences, 2023 - mdpi.com
As internet traffic grows daily, so does the need to protect it. Network security protects data
from unauthorized access and ensures their confidentiality and integrity. Steganography is …

[PDF][PDF] Detection of steganographic threats targeting digital images in heterogeneous ecosystems through machine learning

N Cassavia, L Caviglione, M Guarascio… - Journal of Wireless …, 2022 - jowua.com
Steganography is increasingly exploited by malware to avoid detection and to implement
different advanced offensive schemes. An attack paradigm expected to become widely used …

Cybersecurity and data science

K Szczypiorski - Electronics, 2022 - mdpi.com
Towards the end of the Cold War in 1985, in reference to the theory of leadership for the first
time, in the book 'Leaders: The Strategies For Taking Charge'by Warren Bennis and Burt …