A comprehensive survey on robust image watermarking

W Wan, J Wang, Y Zhang, J Li, H Yu, J Sun - Neurocomputing, 2022 - Elsevier
With the rapid development and popularity of the Internet, multimedia security has become a
general essential concern. Especially, as manipulation of digital images gets much easier …

Digital steganography and watermarking for digital images: A review of current research directions

O Evsutin, A Melman, R Meshcheryakov - IEEE Access, 2020 - ieeexplore.ieee.org
The development of information technology has led to a significant increase in the share of
multimedia traffic in data networks. This has necessitated to solve the following information …

[HTML][HTML] Evolving Generative Adversarial Networks to improve image steganography

A Martín, A Hernández, M Alazab, J Jung… - Expert Systems with …, 2023 - Elsevier
Images have been repeatedly used as the perfect environment to hide information through
the use of steganography techniques. Whether messages, documents or even other images …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques

MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a
major concern in the communication environment, where security must be performed for the …

Local binary pattern‐based reversible data hiding

M Sahu, N Padhy, SS Gantayat… - CAAI Transactions on …, 2022 - Wiley Online Library
A novel local binary pattern‐based reversible data hiding (LBP‐RDH) technique has been
suggested to maintain a fair symmetry between the perceptual transparency and hiding …

[HTML][HTML] Toward secret data location via fuzzy logic and convolutional neural network

NJ De La Croix, T Ahmad - Egyptian Informatics Journal, 2023 - Elsevier
Locating hidden data in digital images, otherwise called steganalysis, is a process of
identifying the existence of secret messages within digital images. Steganalysis is used to …

ImageCLEF 2019: Multimedia retrieval in medicine, lifelogging, security and nature

B Ionescu, H Müller, R Péteri, YD Cid… - Experimental IR Meets …, 2019 - Springer
This paper presents an overview of the ImageCLEF 2019 lab, organized as part of the
Conference and Labs of the Evaluation Forum-CLEF Labs 2019. ImageCLEF is an ongoing …

The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions

H Kheddar, M Hemis, Y Himeur, D Megías, A Amira - Neurocomputing, 2024 - Elsevier
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …