The development of information technology has led to a significant increase in the share of multimedia traffic in data networks. This has necessitated to solve the following information …
Images have been repeatedly used as the perfect environment to hide information through the use of steganography techniques. Whether messages, documents or even other images …
Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern …
MA Hameed, OA Abdel-Aleem… - Journal of Ambient …, 2023 - Springer
With remarkable information technology development, information security has become a major concern in the communication environment, where security must be performed for the …
A novel local binary pattern‐based reversible data hiding (LBP‐RDH) technique has been suggested to maintain a fair symmetry between the perceptual transparency and hiding …
Locating hidden data in digital images, otherwise called steganalysis, is a process of identifying the existence of secret messages within digital images. Steganalysis is used to …
This paper presents an overview of the ImageCLEF 2019 lab, organized as part of the Conference and Labs of the Evaluation Forum-CLEF Labs 2019. ImageCLEF is an ongoing …
Steganography is the primary method by which individuals can communicate covertly; cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
Steganography and steganalysis are two interrelated aspects of the field of information security. Steganography seeks to conceal communications, whereas steganalysis aims to …