A review of digital image forensics

WD Ferreira, CBR Ferreira, G da Cruz Júnior… - Computers & Electrical …, 2020 - Elsevier
The manipulation of digital images has become very common in recent years. Thus, it is
possible to cut, clone, and resize an image very quickly, which makes it challenging to …

A comprehensive survey of image and video forgery techniques: variants, challenges, and future directions

ST Nabi, M Kumar, P Singh, N Aggarwal, K Kumar - Multimedia Systems, 2022 - Springer
With the advent of Internet, images and videos are the most vulnerable media that can be
exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier …

Neural style transfer for image within images and conditional GANs for destylization

JS Ubhi, AK Aggarwal - Journal of Visual Communication and Image …, 2022 - Elsevier
In this paper, the feature representation of an image by CNN is used to hide the secret
image into the cover image. The style of the cover image hides the content of the secret …

Neural style transfer for image steganography and destylization with supervised image to image translation

M Garg, JS Ubhi, AK Aggarwal - Multimedia Tools and Applications, 2023 - Springer
Today, a lot of information is being shared electronically in a way or another. Despite the
advancements in technology used for data transfer, the reliable transmission of sensitive …

A study of various steganographic techniques used for information hiding

CP Sumathi, T Santanam, G Umamaheswari - arXiv preprint arXiv …, 2014 - arxiv.org
Steganography derives from the Greek word steganos, meaning covered or secret, and
graphy (writing or drawing). Steganography is a technology where modern data …

A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information

SA El_Rahman - Computers & Electrical Engineering, 2018 - Elsevier
Steganography is the practice of concealing the communication existence by hiding the
traveled message in cover media. This paper aims to study Discrete Cosine Transform …

A safe and secured medical textual information using an improved LSB image steganography

RO Ogundokun, OC Abikoye - International Journal of Digital …, 2021 - Wiley Online Library
Safe conveyance of medical data across unsecured networks nowadays is an essential
issue in telemedicine. With the exponential growth of multimedia technologies and …

[PDF][PDF] A steganography approach over video images to improve security

M Ramalingam, NAM Isa - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Nowadays the growth of information technologies makes it convenient for people to transmit
mass data like confidential biomedical records, banking or financial data through Internet …

[PDF][PDF] Review of the Literature on the Steganography Concept

F Şahin, T Çevik, M Takaoğlu - International Journal of Computer …, 2021 - researchgate.net
Information hiding is a subject of study from past to present. Information hiding processes,
called steganography, have been the focus of interest since the beginning of history …

[PDF][PDF] A hybrid technique based on RSA and data hiding for securing handwritten signature

YM Wazery, SG Haridy, AA Ali - International Journal of Advanced …, 2021 - academia.edu
Data exchange has been significantly encouraged by the development of communication
technology and the wide use of social media over the Internet. Therefore, it is important to …