Federated learning for the efficient detection of steganographic threats hidden in image icons

N Cassavia, L Caviglione, M Guarascio… - … Intelligence on Web and …, 2022 - Springer
An increasing number of threat actors takes advantage of information hiding techniques to
prevent detection or to drop payloads containing attack routines. With the ubiquitous …

A federated approach for detecting data hidden in icons of mobile applications delivered via web and multiple stores

N Cassavia, L Caviglione, M Guarascio… - Social Network Analysis …, 2023 - Springer
An increasing volume of malicious software exploits information hiding techniques to cloak
additional attack stages or bypass frameworks enforcing security. This trend has intensified …

[PDF][PDF] Novel Rifle Number Recognition Based on Improved YOLO in Military Environment.

H Kwon, S Lee - Computers, Materials & Continua, 2024 - cdn.techscience.cn
Deep neural networks perform well in image recognition, object recognition, pattern
analysis, and speech recognition. In military applications, deep neural networks can detect …

[PDF][PDF] Enhancing Identity Protection inMetaverse-Based Psychological Counseling System.

J Lee, H Lee, SC Lee, H Kwon - Computers, Materials & …, 2024 - cdn.techscience.cn
Non-face-to-face psychological counseling systems rely on network technologies to
anonymize information regarding client identity. However, these systems often face …

StegaNet: A Deep Learning Model for Image Steganography Using Customized CNN and Autoencoders

SS Nadgauda, YR Pennamada… - 2023 OITS International …, 2023 - ieeexplore.ieee.org
Image steganography is a significant area of research that aims at finding any hidden
images or information within other digital images. In this paper, we propose a novel …

[PDF][PDF] ORISHA: Improving Threat Detection through Orchestrated Information Sharing (Discussion Paper).

L Caviglione, C Comito, M Guarascio, G Manco… - SEBD, 2023 - researchgate.net
The exponential growth in the number of cyber threats requires sharing in a timely and
efficient manner a wide range of Indicators of Compromise (IoCs), ie, fragments of forensics …

[PDF][PDF] Digitálnı stegoanalýza

P Dufek - excel.fit.vutbr.cz
V práci je prezentována nove navrhovaná metoda urcená pro detekci LSB steganografie v
obrázcıch s vlastnostmi charakteristicky podobnými digitálnım ikonám. Navrhovaná metoda …