The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

Deep learning for diverse data types steganalysis: A review

H Kheddar, M Hemis, Y Himeur, D Megías… - arXiv preprint arXiv …, 2023 - arxiv.org
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis is aimed …

Copy-move forgery detection using combined features and transitive matching

C Lin, W Lu, X Huang, K Liu, W Sun, H Lin… - Multimedia Tools and …, 2019 - Springer
Recently, the research of Internet of Things (IoT) and Multimedia Big Data (MBD) has been
growing tremendously. Both IoT and MBD have a lot of multimedia data, which can be …

Adversarial steganography based on sparse cover enhancement

C Qin, W Zhang, X Dong, H Zha, N Yu - Journal of Visual Communication …, 2021 - Elsevier
Abstract CNN (Convolutional Neural Network) steganalyzers achieve enormous
improvements in detecting stego images. However, they are easily deceived by adversarial …

Adaptive multi-teacher softened relational knowledge distillation framework for payload mismatch in image steganalysis

L Yu, Y Li, S Weng, H Tian, J Liu - Journal of Visual Communication and …, 2023 - Elsevier
In this paper, we focus on improving the detection accuracy when payload mismatch occurs
in steganalysis, by proposing an adaptive multi-teacher softened relational knowledge …

Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization

DD Shankar, AS Azhakath - Scientific Reports, 2023 - nature.com
The evolvement in digital media and information technology over the past decades have
purveyed the internet to be an effectual medium for the exchange of data and …

Binary image steganography based on joint distortion measurement

J Zhang, W Lu, X Yin, W Liu, Y Yeung - Journal of Visual Communication …, 2019 - Elsevier
Most state-of-the-art binary image steganography methods depend on the content of the
image to determine where to embed secret messages, which is capacity-limited and …

Region duplication detection based on hybrid feature and evaluative clustering

C Lin, W Lu, X Huang, K Liu, W Sun, H Lin - Multimedia Tools and …, 2019 - Springer
Digital image are easy to be tampered by the photo editing software. Therefore, digital
image forensics which aims at validating the authenticity of the digital image are received …

Defocus blur detection based on multiscale SVD fusion in gradient domain

H Xiao, W Lu, R Li, N Zhong, Y Yeung, J Chen… - Journal of Visual …, 2019 - Elsevier
Recently, defocus blur detection has been an extensive study, but it is still full of challenges
in the blur estimation without having any prior knowledge of test image such as blur kernel …

Copy move forgery detection based on keypoint and patch match

K Liu, W Lu, C Lin, X Huang, X Liu, Y Yeung… - Multimedia tools and …, 2019 - Springer
Copy move has become a simple and effective operation for image forgeries due to the
advancement of image editing software, which is still challenging to be detected. In this …