The infinite race between steganography and steganalysis in images
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research
DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security
services have received a lot of attention. Among those trends are steganography and …
services have received a lot of attention. Among those trends are steganography and …
Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier
The success rate for blind or universal steganalysis lies in the ability to extract the statistical
footprints of image features. Further, the choice of machine learning (ML) algorithm is crucial …
footprints of image features. Further, the choice of machine learning (ML) algorithm is crucial …
Steganography and Steganalysis (in digital forensics): a Cybersecurity guide
Steganography and steganalysis is a relatively new-fangled scientific discipline in security
systems and digital forensics, respectively, but one that has matured greatly over the past …
systems and digital forensics, respectively, but one that has matured greatly over the past …
Image steganography approaches and their detection strategies: A survey
Steganography is the art and science of hidden (or covered) communication. In digital
steganography, the bits of image, video, audio and text files are tweaked to represent the …
steganography, the bits of image, video, audio and text files are tweaked to represent the …
[HTML][HTML] Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution
There are a few issues related to the existing symmetric encryption models for color image
data, such as the key generation and distribution problems. In this paper, we propose a …
data, such as the key generation and distribution problems. In this paper, we propose a …
[HTML][HTML] Monitoring the security of audio biomedical signals communications in wearable IoT healthcare
The COVID-19 pandemic has imposed new challenges on the healthcare industry as
hospital staff are exposed to a massive coronavirus load when registering new patients …
hospital staff are exposed to a massive coronavirus load when registering new patients …
A survey of recent advances in image steganography
Over the course of technological development, data security while transmission and storing
has always been a field of continuous advancements and key importance. In the recent …
has always been a field of continuous advancements and key importance. In the recent …
Random embedded calibrated statistical blind steganalysis using cross validated support vector machine and support vector machine with particle swarm optimization
The evolvement in digital media and information technology over the past decades have
purveyed the internet to be an effectual medium for the exchange of data and …
purveyed the internet to be an effectual medium for the exchange of data and …
An intelligent cryptographic key management model for secure communications in distributed industrial intelligent systems
For secure communication in a distributed cooperation, generally, the data are encrypted
and decrypted using a symmetric key. The process of creating, distributing, storing …
and decrypted using a symmetric key. The process of creating, distributing, storing …