A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions

ST Nabi, M Kumar, P Singh, N Aggarwal, K Kumar - Multimedia Systems, 2022 - Springer
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …

A comprehensive survey on methods for image integrity

P Capasso, G Cattaneo, M De Marsico - ACM Transactions on …, 2024 - dl.acm.org
The outbreak of digital devices on the Internet, the exponential diffusion of data (images,
video, audio, and text), along with their manipulation/generation also by artificial intelligence …

[PDF][PDF] An enhanced LSB-image steganography using the hybrid Canny-Sobel edge detection

J Jumanto - Cybernetics and information technologies, 2018 - sciendo.com
The Internet is a public network with many issues of data transfer security. Steganography is
a data transmission security technique that is done by hiding the message in a container …

An improved security and message capacity using AES and Huffman coding on image steganography

CA Sari, G Ardiansyah… - … Electronics and Control …, 2019 - telkomnika.uad.ac.id
Abstract Information security is very important and has been widely implemented.
Cryptography and steganography are two common methods that can be implemented to …

A deep-learning-based image forgery detection framework for controlling the spread of misinformation

A Ghai, P Kumar, S Gupta - Information Technology & People, 2024 - emerald.com
Purpose Web users rely heavily on online content make decisions without assessing the
veracity of the content. The online content comprising text, image, video or audio may be …

Simple and secure image steganography using LSB and triple XOR operation on MSB

YP Astuti, EH Rachmawanto… - … on Information and …, 2018 - ieeexplore.ieee.org
Least Significant Bit (LSB) is a very popular method in the spatial domain of steganographic
images. This method is widely used and continues to be developed to date, because of its …

Teknik penyembunyian dan enkripsi pesan pada citra digital dengan kombinasi metode LSB dan RSA

AE Handoyo, EH Rachmawanto… - Jurnal Teknologi dan …, 2018 - jtsiskom.undip.ac.id
This study proposed a combination of steganography and cryptography techniques using
LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to …

A comparative study of image cryptographic method

EH Rachmawanto, CA Sari, A Susanto… - 2018 5th International …, 2018 - ieeexplore.ieee.org
Cryptography is a technique that is widely used to secure data transactions, this technique
has also been widely used to secure digital images. There are several cryptographic …

Design and implementation of AES and SHA-256 cryptography for securing multimedia file over android chat application

NA Fauziah, EH Rachmawanto… - … International Seminar on …, 2018 - ieeexplore.ieee.org
In the current era of globalization, security is one of the most important aspects in the
development of communication applications, especially when sending confidential files …

Smart city research in Indonesia: A bibliometric analysis

A Parlina, H Murfi, K Ramli - 2019 16th International …, 2019 - ieeexplore.ieee.org
The smart city is a topic that has begun to capture the interest of researchers. This study
aims to capture trends of smart city research in Indonesia by conducting a bibliometric …