A review of image steganalysis techniques for digital forensics

K Karampidis, E Kavallieratou… - Journal of information …, 2018 - Elsevier
Steganalysis and steganography are the two different sides of the same coin.
Steganography tries to hide messages in plain sight while steganalysis tries to detect their …

[HTML][HTML] Comprehensive survey on image steganalysis using deep learning

NJ De La Croix, T Ahmad, F Han - Array, 2024 - Elsevier
Steganalysis, a field devoted to detecting concealed information in various forms of digital
media, including text, images, audio, and video files, has evolved significantly over time …

A new transform domain steganography based on modified logistic chaotic map for color images

MY Valandar, P Ayubi, MJ Barani - Journal of Information Security and …, 2017 - Elsevier
The art and science of hiding information by embedding messages in various type of digital
media is called steganography. This method performs by replacing bits of multimedia files …

SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images

S Arunkumar, V Subramaniyaswamy, V Vijayakumar… - Measurement, 2019 - Elsevier
The advances in computer technologies and the Internet have made rapid strides and
breakthroughs in the field of data communication, which nowadays, is easily accessed …

[PDF][PDF] Steganography techniques–A review paper

J Kour, D Verma - International Journal of Emerging Research in …, 2014 - academia.edu
Steganography is defined as the study of invisible communication. Steganography usually
deals with the ways of hiding the existence of the communicated data in such a way that it …

[HTML][HTML] Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research

DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security
services have received a lot of attention. Among those trends are steganography and …

Amount-based covert communication over blockchain

Y Tian, X Liao, L Dong, Y Xu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Recent years have witnessed the booming growth of 5G and 6G technology, which has
brought unprecedented massive data transmission, causing severe privacy issues …

Robust image watermarking approach using polar harmonic transforms based geometric correction

X Wang, Y Liu, S Li, H Yang, P Niu - Neurocomputing, 2016 - Elsevier
Geometric distortions that cause displacement between embedding and detection are
usually difficult for watermark to survive. It is a challenging work to design a robust image …

Rank-based image watermarking method with high embedding capacity and robustness

T Zong, Y **ang, S Guo, Y Rong - IEEE Access, 2016 - ieeexplore.ieee.org
This paper presents a novel rank-based method for image watermarking. In the watermark
embedding process, the host image is divided into blocks, followed by the 2-D discrete …

Rotation and scale invariant image watermarking based on polar harmonic transforms

H Xu, X Kang, Y Chen, Y Wang - Optik, 2019 - Elsevier
Geometric attacks such as rotation and scale can destroy the synchronization of
watermarking, designing a geometric-distortion resilient watermarking is currently a …