Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review of image steganalysis techniques for digital forensics
K Karampidis, E Kavallieratou… - Journal of information …, 2018 - Elsevier
Steganalysis and steganography are the two different sides of the same coin.
Steganography tries to hide messages in plain sight while steganalysis tries to detect their …
Steganography tries to hide messages in plain sight while steganalysis tries to detect their …
[HTML][HTML] Comprehensive survey on image steganalysis using deep learning
Steganalysis, a field devoted to detecting concealed information in various forms of digital
media, including text, images, audio, and video files, has evolved significantly over time …
media, including text, images, audio, and video files, has evolved significantly over time …
A new transform domain steganography based on modified logistic chaotic map for color images
The art and science of hiding information by embedding messages in various type of digital
media is called steganography. This method performs by replacing bits of multimedia files …
media is called steganography. This method performs by replacing bits of multimedia files …
SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images
The advances in computer technologies and the Internet have made rapid strides and
breakthroughs in the field of data communication, which nowadays, is easily accessed …
breakthroughs in the field of data communication, which nowadays, is easily accessed …
[PDF][PDF] Steganography techniques–A review paper
J Kour, D Verma - International Journal of Emerging Research in …, 2014 - academia.edu
Steganography is defined as the study of invisible communication. Steganography usually
deals with the ways of hiding the existence of the communicated data in such a way that it …
deals with the ways of hiding the existence of the communicated data in such a way that it …
[HTML][HTML] Comprehensive survey of multimedia steganalysis: Techniques, evaluations, and trends in future research
DA Shehab, MJ Alhaddad - Symmetry, 2022 - mdpi.com
During recent years, emerging multimedia processing techniques with information security
services have received a lot of attention. Among those trends are steganography and …
services have received a lot of attention. Among those trends are steganography and …
Amount-based covert communication over blockchain
Recent years have witnessed the booming growth of 5G and 6G technology, which has
brought unprecedented massive data transmission, causing severe privacy issues …
brought unprecedented massive data transmission, causing severe privacy issues …
Robust image watermarking approach using polar harmonic transforms based geometric correction
X Wang, Y Liu, S Li, H Yang, P Niu - Neurocomputing, 2016 - Elsevier
Geometric distortions that cause displacement between embedding and detection are
usually difficult for watermark to survive. It is a challenging work to design a robust image …
usually difficult for watermark to survive. It is a challenging work to design a robust image …
Rank-based image watermarking method with high embedding capacity and robustness
This paper presents a novel rank-based method for image watermarking. In the watermark
embedding process, the host image is divided into blocks, followed by the 2-D discrete …
embedding process, the host image is divided into blocks, followed by the 2-D discrete …
Rotation and scale invariant image watermarking based on polar harmonic transforms
H Xu, X Kang, Y Chen, Y Wang - Optik, 2019 - Elsevier
Geometric attacks such as rotation and scale can destroy the synchronization of
watermarking, designing a geometric-distortion resilient watermarking is currently a …
watermarking, designing a geometric-distortion resilient watermarking is currently a …