Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …
main aspects of early steganography are security, imperceptibility, and payload. Security is …
Hybrid lstm and encoder–decoder architecture for detection of image forgeries
With advanced image journaling tools, one can easily alter the semantic meaning of an
image by exploiting certain manipulation techniques such as copy clone, object splicing …
image by exploiting certain manipulation techniques such as copy clone, object splicing …
Low-complexity features for JPEG steganalysis using undecimated DCT
V Holub, J Fridrich - IEEE Transactions on Information forensics …, 2014 - ieeexplore.ieee.org
This paper introduces a novel feature set for steganalysis of JPEG images. The features are
engineered as first-order statistics of quantized noise residuals obtained from the …
engineered as first-order statistics of quantized noise residuals obtained from the …
Exploiting spatial structure for localizing manipulated image regions
JH Bappy, AK Roy-Chowdhury… - Proceedings of the …, 2017 - openaccess.thecvf.com
The advent of high-tech journaling tools facilitates an image to be manipulated in a way that
can easily evade state-of-the-art image tampering detection approaches. The recent …
can easily evade state-of-the-art image tampering detection approaches. The recent …
Overview of image inpainting and forensic technology
K Liu, J Li, SS Hussain Bukhari - Security and Communication …, 2022 - Wiley Online Library
At present, digital image is the most significant information carrier on the Internet, which
provides convenience for people to exchange information. With the progress of image …
provides convenience for people to exchange information. With the progress of image …
Detection and localization of image forgeries using resampling features and deep learning
Resampling is an important signature of manipulated images. In this paper, we propose two
methods to detect and localize image manipulations based on a combination of resampling …
methods to detect and localize image manipulations based on a combination of resampling …
High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform
The importance of image steganography is unquestionable in the field of secure multimedia
communication. Imperceptibility and high payload capacity are some of the crucial parts of …
communication. Imperceptibility and high payload capacity are some of the crucial parts of …
Deep matching and validation network: An end-to-end solution to constrained image splicing localization and detection
Image splicing is a very common image manipulation technique that is sometimes used for
malicious purposes. A splicing detection and localization algorithm usually takes an input …
malicious purposes. A splicing detection and localization algorithm usually takes an input …
High performance reversible data hiding scheme through multilevel histogram modification in lifting integer wavelet transform
S Subburam, S Selvakumar, S Geetha - Multimedia Tools and …, 2018 - Springer
This paper proposes a digital image reversible data hiding method in integer lifting transform
domain. Owing to the characteristics of the natural image statistics, the neighbor pixel values …
domain. Owing to the characteristics of the natural image statistics, the neighbor pixel values …
A robust forgery detection algorithm for object removal by exemplar-based image inpainting
Object removal is a malicious image forgery technique, which is usually achieved by
exemplar-based image inpainting in a visually plausible way. Most existing forgery detection …
exemplar-based image inpainting in a visually plausible way. Most existing forgery detection …