Digital image steganalysis: current methodologies and future challenges
WM Eid, SS Alotaibi, HM Alqahtani, SQ Saleh - Ieee Access, 2022 - ieeexplore.ieee.org
With the growing use of the internet and social media, data security has become a major
issue. Thus, researchers are focusing on data security techniques such as steganography …
issue. Thus, researchers are focusing on data security techniques such as steganography …
The state of the art in machine learning-based digital forensics
Digital forensics of visual-based evidence from video surveillance systems and forensic
photographs holds object detection as a key aspect of the process. Recognizing an instance …
photographs holds object detection as a key aspect of the process. Recognizing an instance …
Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images
Steganalysis and forgery detection in image forensics are generally investigated separately.
We have designed a method targeting the detection of both steganography and seam …
We have designed a method targeting the detection of both steganography and seam …
Steganalysis of DCT-embedding based adaptive steganography and YASS
Q Liu - Proceedings of the thirteenth ACM multimedia …, 2011 - dl.acm.org
Recently well-designed adaptive steganographic systems, including±1 embedding in the
DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious …
DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious …
Derivative-based audio steganalysis
This article presents a second-order derivative-based audio steganalysis. First, Mel-
cepstrum coefficients and Markov transition features from the second-order derivative of the …
cepstrum coefficients and Markov transition features from the second-order derivative of the …
An approach to detecting JPEG down-recompression and seam carving forgery under recompression anti-forensics
Q Liu - Pattern recognition, 2017 - Elsevier
In multimedia forensics, the detection of forgery on joint photographic experts group (JPEG)
images is an interesting and challenging work. JPEG double compression, one of common …
images is an interesting and challenging work. JPEG double compression, one of common …
A novel forensic image analysis tool for discovering double JPEG compression clues
This paper presents a novel technique to discover double JPEG compression traces.
Existing detectors only operate in a scenario that the image under investigation is explicitly …
Existing detectors only operate in a scenario that the image under investigation is explicitly …
Quantization-unaware double JPEG compression detection
The current double JPEG compression detection techniques identify whether or not an JPEG
image file has undergone the compression twice, by knowing its embedded quantization …
image file has undergone the compression twice, by knowing its embedded quantization …
Deep multi-scale discriminative networks for double JPEG compression forensics
As JPEG is the most widely used image format, the importance of tampering detection for
JPEG images in blind forensics is self-evident. In this area, extracting effective statistical …
JPEG images in blind forensics is self-evident. In this area, extracting effective statistical …