Due to its critical role in cybersecurity, digital forensics has received significant attention from researchers and practitioners alike. The ever increasing sophistication of modern …
The spectral analysis of signals is currently either dominated by the speed–accuracy trade- off or ignores a signal's often non-stationary character. Here we introduce an open-source …
This research aims to compare the performance of two forensic investigation methods, the National Institute of Justice (NIJ) and the National Institute of Standards and Technology …
Recently, the number of cyber attacks against IoT domains has increased tremendously. This resulted into both human and financial losses at all IoT levels especially individual and …
Abstract Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image‐based …
Progress in Deep Learning (DL) has introduced alternative methods for tackling complex challenges, such as the steganalysis of spatial domain images, where Convolutional Neural …
DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security services have received a lot of attention. Among those trends are steganography and …
Steganography is the art and science of hidden (or covered) communication. In digital steganography, the bits of image, video, audio and text files are tweaked to represent the …
In recent years, there has been a dramatic change in attitude towards computers and the use of computer resources in general. Cloud and Edge computing have emerged as the …