Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Hybrid lstm and encoder–decoder architecture for detection of image forgeries

JH Bappy, C Simons, L Nataraj… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
With advanced image journaling tools, one can easily alter the semantic meaning of an
image by exploiting certain manipulation techniques such as copy clone, object splicing …

Low-complexity features for JPEG steganalysis using undecimated DCT

V Holub, J Fridrich - IEEE Transactions on Information forensics …, 2014 - ieeexplore.ieee.org
This paper introduces a novel feature set for steganalysis of JPEG images. The features are
engineered as first-order statistics of quantized noise residuals obtained from the …

Exploiting spatial structure for localizing manipulated image regions

JH Bappy, AK Roy-Chowdhury… - Proceedings of the …, 2017 - openaccess.thecvf.com
The advent of high-tech journaling tools facilitates an image to be manipulated in a way that
can easily evade state-of-the-art image tampering detection approaches. The recent …

Overview of image inpainting and forensic technology

K Liu, J Li, SS Hussain Bukhari - Security and Communication …, 2022 - Wiley Online Library
At present, digital image is the most significant information carrier on the Internet, which
provides convenience for people to exchange information. With the progress of image …

Detection and localization of image forgeries using resampling features and deep learning

J Bunk, JH Bappy, TM Mohammed… - … IEEE conference on …, 2017 - ieeexplore.ieee.org
Resampling is an important signature of manipulated images. In this paper, we propose two
methods to detect and localize image manipulations based on a combination of resampling …

High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform

IJ Kadhim, P Premaratne, PJ Vial - Cognitive Systems Research, 2020 - Elsevier
The importance of image steganography is unquestionable in the field of secure multimedia
communication. Imperceptibility and high payload capacity are some of the crucial parts of …

Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection

Y Wu, W Abd-Almageed, P Natarajan - Proceedings of the 25th ACM …, 2017 - dl.acm.org
Image splicing is a very common image manipulation technique that is sometimes used for
malicious purposes. A splicing detection and localization algorithm usually takes an input …

High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform

S Subburam, S Selvakumar, S Geetha - Multimedia Tools and …, 2018 - Springer
This paper proposes a digital image reversible data hiding method in integer lifting transform
domain. Owing to the characteristics of the natural image statistics, the neighbor pixel values …

A robust forgery detection algorithm for object removal by exemplar-based image inpainting

D Zhang, Z Liang, G Yang, Q Li, L Li, X Sun - Multimedia Tools and …, 2018 - Springer
Object removal is a malicious image forgery technique, which is usually achieved by
exemplar-based image inpainting in a visually plausible way. Most existing forgery detection …