Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or from the internet, when the victim interacts with the source of infection. To …
phishing email or from the internet, when the victim interacts with the source of infection. To …
Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition
JY Wu, WL Huang, WM **a-Hou, WP Zou… - Multimedia Tools and …, 2020 - Springer
An imperceptible digital watermarking algorithm based on 4-level discrete wavelet
transform, discrete cosine transform and singular value decomposition is designed. In this …
transform, discrete cosine transform and singular value decomposition is designed. In this …
Generative focused feedback residual networks for image steganalysis and hidden information reconstruction
Z Lai, X Zhu, J Wu - Applied Soft Computing, 2022 - Elsevier
Image steganalysis is the process of detecting the presence of hidden information in an
image. Existing image steganalysis methods cannot fully extract hidden image information …
image. Existing image steganalysis methods cannot fully extract hidden image information …
Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges
M Alazab, T Pham - Authorea Preprints, 2023 - techrxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or downloading illegitimate files from the internet, when the victim interacts …
phishing email or downloading illegitimate files from the internet, when the victim interacts …
Adaptive spatial image steganography and steganalysis using perceptual modelling and machine learning
G **e - 2022 - stax.strath.ac.uk
Image steganography is a method for communicating secret messages under the cover
images. A sender will embed the secret messages into the cover images according to an …
images. A sender will embed the secret messages into the cover images according to an …
Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model
C **a, Y Liu, Q Guan, S Ma, Y Nan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Current steganalytic classifiers always need a large number of cover-stego image pairs for
training. However in this paper we focus on a scenario where steganalysts have a few cover …
training. However in this paper we focus on a scenario where steganalysts have a few cover …
Tackling the Emerging Threat of Image-Based Steganographic Malware with Advanced Machine Learning Techniques
S Adhav, A Sarpate, S Gaisamudre… - … Conference on Data …, 2024 - ieeexplore.ieee.org
The increasing threat of malware concealed within images through steganography
underscores the need for advanced detection methods. Traditional signature-based …
underscores the need for advanced detection methods. Traditional signature-based …
Evaluation of deep learning and conventional approaches for image steganalysis
G **e, J Ren, H Zhao, S Zhao, S Marshall - Advances in Brain Inspired …, 2020 - Springer
Steganography is the technique that's used to embed secret messages into digital media
without changing their appearances. As a countermeasure to steganography, steganalysis …
without changing their appearances. As a countermeasure to steganography, steganalysis …
[CITATION][C] Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective [2019 50330-50346]
C **a, K Wu, Q Guan, X Tong, Z Li, Y Xue - IEEE Access, 2019 - ieeexplore.ieee.org
Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and
Effective Page 1 Received July 29, 2019, accepted July 29, 2019, date of current version August …
Effective Page 1 Received July 29, 2019, accepted July 29, 2019, date of current version August …