The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

[HTML][HTML] Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research

DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security
services have received a lot of attention. Among those trends are steganography and …

Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier

J Hemalatha, M Sekar, C Kumar, A Gutub… - Journal of Information …, 2023 - Elsevier
The success rate for blind or universal steganalysis lies in the ability to extract the statistical
footprints of image features. Further, the choice of machine learning (ML) algorithm is crucial …

Steganography and Steganalysis (in digital forensics): a Cybersecurity guide

M Dalal, M Juneja - Multimedia Tools and Applications, 2021 - Springer
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …

[HTML][HTML] Monitoring the security of audio biomedical signals communications in wearable IoT healthcare

S Yazdanpanah, SS Chaeikar, A Jolfaei - Digital Communications and …, 2023 - Elsevier
The COVID-19 pandemic has imposed new challenges on the healthcare industry as
hospital staff are exposed to a massive coronavirus load when registering new patients …

[HTML][HTML] Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

E Setyaningsih, R Wardoyo, AK Sari - Digital Communications and …, 2020 - Elsevier
There are a few issues related to the existing symmetric encryption models for color image
data, such as the key generation and distribution problems. In this paper, we propose a …

A survey of recent advances in image steganography

A Kumar, R Rani, S Singh - Security and Privacy, 2023 - Wiley Online Library
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …

[HTML][HTML] Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm …

DD Shankar, AS Azhakath - Scientific Reports, 2023 - nature.com
The evolvement in digital media and information technology over the past decades have
purveyed the internet to be an effectual medium for the exchange of data and …

An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems

SS Chaeikar, M Alizadeh, MH Tadayon… - … Journal of Intelligent …, 2022 - Wiley Online Library
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …

Ensemble SW image steganalysis: A low dimension method for LSBR detection

SS Chaeikar, A Ahmadi - Signal Processing: Image Communication, 2019 - Elsevier
Blind steganalysis examines digital media for the likely existence of hidden messages,
without prior knowledge of the steganographic algorithm that may have been used to hide …