Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

R Chaganti, V Ravi, M Alazab, TD Pham - arxiv preprint arxiv:2110.02504, 2021 - arxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or from the internet, when the victim interacts with the source of infection. To …

Imperceptible digital watermarking scheme combining 4-level discrete wavelet transform with singular value decomposition

JY Wu, WL Huang, WM **a-Hou, WP Zou… - Multimedia Tools and …, 2020 - Springer
An imperceptible digital watermarking algorithm based on 4-level discrete wavelet
transform, discrete cosine transform and singular value decomposition is designed. In this …

Generative focused feedback residual networks for image steganalysis and hidden information reconstruction

Z Lai, X Zhu, J Wu - Applied Soft Computing, 2022 - Elsevier
Image steganalysis is the process of detecting the presence of hidden information in an
image. Existing image steganalysis methods cannot fully extract hidden image information …

Stegomalware: A Systematic Survey of Malware Hiding and Detection in Images, Machine Learning Models and Research Challenges

M Alazab, T Pham - Authorea Preprints, 2023 - techrxiv.org
Malware distribution to the victim network is commonly performed through file attachments in
phishing email or downloading illegitimate files from the internet, when the victim interacts …

Adaptive spatial image steganography and steganalysis using perceptual modelling and machine learning

G **e - 2022 - stax.strath.ac.uk
Image steganography is a method for communicating secret messages under the cover
images. A sender will embed the secret messages into the cover images according to an …

Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model

C **a, Y Liu, Q Guan, S Ma, Y Nan… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Current steganalytic classifiers always need a large number of cover-stego image pairs for
training. However in this paper we focus on a scenario where steganalysts have a few cover …

Tackling the Emerging Threat of Image-Based Steganographic Malware with Advanced Machine Learning Techniques

S Adhav, A Sarpate, S Gaisamudre… - … Conference on Data …, 2024 - ieeexplore.ieee.org
The increasing threat of malware concealed within images through steganography
underscores the need for advanced detection methods. Traditional signature-based …

Evaluation of deep learning and conventional approaches for image steganalysis

G **e, J Ren, H Zhao, S Zhao, S Marshall - Advances in Brain Inspired …, 2020 - Springer
Steganography is the technique that's used to embed secret messages into digital media
without changing their appearances. As a countermeasure to steganography, steganalysis …

[CITATION][C] Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective [2019 50330-50346]

C **a, K Wu, Q Guan, X Tong, Z Li, Y Xue - IEEE Access, 2019 - ieeexplore.ieee.org
Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and
Effective Page 1 Received July 29, 2019, accepted July 29, 2019, date of current version August …