A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …
A comprehensive survey on methods for image integrity
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …
video, audio, and text), along with their manipulation/generation also by artificial intelligence …
[PDF][PDF] An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection
J Jumanto - Cybernetics and information technologies, 2018 - sciendo.com
The Internet is a public network with many issues of data transfer security. Steganography is
a data transmission security technique that is done by hiding the message in a container …
a data transmission security technique that is done by hiding the message in a container …
An improved security and message capacity using AES and Huffman coding on image steganography
CA Sari, G Ardiansyah… - … Electronics and Control …, 2019 - telkomnika.uad.ac.id
Abstract Information security is very important and has been widely implemented.
Cryptography and steganography are two common methods that can be implemented to …
Cryptography and steganography are two common methods that can be implemented to …
A deep-learning-based image forgery detection framework for controlling the spread of misinformation
Purpose Web users rely heavily on online content make decisions without assessing the
veracity of the content. The online content comprising text, image, video or audio may be …
veracity of the content. The online content comprising text, image, video or audio may be …
Simple and secure image steganography using LSB and triple XOR operation on MSB
YP Astuti, EH Rachmawanto… - … on Information and …, 2018 - ieeexplore.ieee.org
Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic
images. This method is widely used and continues to be developed to date, because of its …
images. This method is widely used and continues to be developed to date, because of its …
Teknik penyembunyian dan enkripsi pesan pada citra digital dengan kombinasi metode LSB dan RSA
AE Handoyo, EH Rachmawanto… - Jurnal Teknologi dan …, 2018 - jtsiskom.undip.ac.id
This study proposed a combination of steganography and cryptography techniques using
LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to …
LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to …
A comparative study of image cryptographic method
Cryptography is a technique that is widely used to secure data transactions, this technique
has also been widely used to secure digital images. There are several cryptographic …
has also been widely used to secure digital images. There are several cryptographic …
Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application
NA Fauziah, EH Rachmawanto… - … International Seminar on …, 2018 - ieeexplore.ieee.org
In the current era of globalization, security is one of the most important aspects in the
development of communication applications, especially when sending confidential files …
development of communication applications, especially when sending confidential files …
Smart city research in Indonesia: A bibliometric analysis
The smart city is a topic that has begun to capture the interest of researchers. This study
aims to capture trends of smart city research in Indonesia by conducting a bibliometric …
aims to capture trends of smart city research in Indonesia by conducting a bibliometric …