CNN-based adversarial embedding for image steganography

W Tang, B Li, S Tan, M Barni… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Steganographic schemes are commonly designed in a way to preserve image statistics or
steganalytic features. Since most of the state-of-the-art steganalytic methods employ a …

MalJPEG: Machine learning based solution for the detection of malicious JPEG images

A Cohen, N Nissim, Y Elovici - IEEE Access, 2020 - ieeexplore.ieee.org
In recent years, cyber-attacks against individuals, businesses, and organizations have
increased. Cyber criminals are always looking for effective vectors to deliver malware to …

Adaptive feature selection for image steganalysis based on classification metrics

Y Ma, X Yu, X Luo, D Liu, Y Zhang - Information Sciences, 2023 - Elsevier
Feature selection can remove redundant and useless features, which is an essential way to
improve steganalysis efficiency. However, with the diversity of steganalysis features, feature …

Natural steganography in JPEG domain with a linear development pipeline

T Taburet, P Bas, W Sawaya… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
In order to achieve high practical security, Natural Steganography (NS) uses cover images
captured at ISO sensitivity ISO 1 and generates stego images mimicking ISO sensitivity ISO …

A new steganography method for embedding message in JPEG images

A Darbani, MM AlyanNezhadi… - 2019 5th conference on …, 2019 - ieeexplore.ieee.org
Steganography is widely applied by information security systems. The aim of steganography
is to create a secret and secure channel between the sender and receiver. Steganography is …

Multivariate side-informed Gaussian embedding minimizing statistical detectability

E Giboulot, P Bas, R Cogranne - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Steganography schemes based on a deflection criterion for embedding posses a clear
advantage against schemes based on heuristics as they provide a direct link between …

[HTML][HTML] A Novel Fragmented Approach for Securing Medical Health Records in Multimodal Medical Images

G Latif, J Alghazo, N Mohammad, SE Abdelhamid… - Applied Sciences, 2024 - mdpi.com
Medical health records hold personal medical information and should only be accessed by
authorized medical personnel or concerned patients. The importance of medical health …

Critical review of bio‐inspired data optimization techniques: An image steganalysis perspective

AC Johnvictor, AJ Amalanathan… - … : Data Mining and …, 2022 - Wiley Online Library
Image steganalysis involves the discovery of secret information embedded in an image. The
common method is blind image steganalysis, which is a two‐class classification problem …

Adaptive matrix pattern steganography on RGB images

A Nilizadeh, S Nilizadeh… - Journal of Cyber …, 2022 - journals.riverpublishers.com
Adaptive Matrix Pattern Steganography on RGB Images | Journal of Cyber Security and Mobility
ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version) Skip to main content Skip to …

Detectability-based JPEG steganography modeling the processing pipeline: The noise-content trade-off

Q Giboulot, R Cogranne, P Bas - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The current art of steganography shows that schemes using a deflection criterion (such as
MiPOD) for JPEG steganography are usually subpar with respect to distortion-based …