Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)

S Rustad, PN Andono, GF Shidik - Signal processing, 2023 - Elsevier
Digital steganography has a long history, starting to be developed in the 90s until now. The
main aspects of early steganography are security, imperceptibility, and payload. Security is …

Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

The fast continuous wavelet transformation (fCWT) for real-time, high-quality, noise-resistant time–frequency analysis

LPA Arts, EL van den Broek - Nature Computational Science, 2022 - nature.com
The spectral analysis of signals is currently either dominated by the speed–accuracy trade-
off or ignores a signal's often non-stationary character. Here we introduce an open-source …

Comparative analysis of nij and nist methods for microsd investigations: A technopreneur approach

N Anwar, AM Widodo, BA Sekti, MB Ulum… - Aptisi Transactions on …, 2024 - att.aptisi.or.id
This research aims to compare the performance of two forensic investigation methods, the
National Institute of Justice (NIJ) and the National Institute of Standards and Technology …

Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

JPA Yaacoub, HN Noura, O Salman, A Chehab - Internet of Things, 2022 - Elsevier
Recently, the number of cyber attacks against IoT domains has increased tremendously.
This resulted into both human and financial losses at all IoT levels especially individual and …

IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network

AA Khan, AA Shaikh, O Cheikhrouhou… - IET Image …, 2022 - Wiley Online Library
Abstract Information hiding aims to embed a crucial amount of confidential data records into
the multimedia, such as text, audio, static and dynamic image, and video. Image‐based …

Enhancing Secret Data Detection Using Convolutional Neural Networks with Fuzzy Edge Detection

NJ De La Croix, T Ahmad, F Han - IEEE Access, 2023 - ieeexplore.ieee.org
Progress in Deep Learning (DL) has introduced alternative methods for tackling complex
challenges, such as the steganalysis of spatial domain images, where Convolutional Neural …

Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research

DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security
services have received a lot of attention. Among those trends are steganography and …

Image steganography approaches and their detection strategies: A survey

MH Kombrink, ZJMH Geradts, M Worring - ACM Computing Surveys, 2024 - dl.acm.org
Steganography is the art and science of hidden (or covered) communication. In digital
steganography, the bits of image, video, audio and text files are tweaked to represent the …

Cloud and edge computing-based computer forensics: Challenges and open problems

V Prakash, A Williams, L Garg, C Savaglio, S Bawa - Electronics, 2021 - mdpi.com
In recent years, there has been a dramatic change in attitude towards computers and the
use of computer resources in general. Cloud and Edge computing have emerged as the …