Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions
Steganography and steganalysis are two interrelated aspects of the field of information
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
security. Steganography seeks to conceal communications, whereas steganalysis aims to …
[HTML][HTML] Steganography and steganalysis in voice over IP: A review
Z Wu, J Guo, C Zhang, C Li - Sensors, 2021 - mdpi.com
The rapid advance and popularization of VoIP (Voice over IP) has also brought security
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …
issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the …
AHCM: Adaptive Huffman code map** for audio steganography based on psychoacoustic model
Most current audio steganographic methods are content non-adaptive which have poor
security and low embedding capacity. This paper proposes a generalized adaptive Huffman …
security and low embedding capacity. This paper proposes a generalized adaptive Huffman …
Detection of heterogeneous parallel steganography for low bit-rate VoIP speech streams
This paper considers a new task of detecting heterogeneous parallel steganography (HPS)
on streaming media. This task is to detect the existence of the confidential messages hidden …
on streaming media. This task is to detect the existence of the confidential messages hidden …
Detection of multiple steganography methods in compressed speech based on code element embedding, Bi-LSTM and CNN with attention mechanisms
S Li, J Wang, P Liu, M Wei, Q Yan - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
Steganographic algorithms in low-bit-rate compressed speech bring convenience to realize
covert communication, meanwhile result in safety issues. The existing steganalysis methods …
covert communication, meanwhile result in safety issues. The existing steganalysis methods …
Separable convolution network with dual-stream pyramid enhanced strategy for speech steganalysis
Steganography based on fixed codebook has become one of the most important branches
of speech steganography due to its high imperceptibility and having the largest available …
of speech steganography due to its high imperceptibility and having the largest available …
STFF-SM: Steganalysis model based on spatial and temporal feature fusion for speech streams
The real-time detection of speech steganography in Voice-over-Internet-Protocol (VoIP)
scenarios remains an open problem, as it requires steganalysis methods to perform for low …
scenarios remains an open problem, as it requires steganalysis methods to perform for low …
Multi-Agent Deep Learning for the Detection of Multiple Speech Steganography Methods
The ability to detect multiple steganographic methods in speech streams is an important
prerequisite for steganalysis methods to move from theory to practical application, but it is …
prerequisite for steganalysis methods to move from theory to practical application, but it is …
Securing IoT data using steganography: A practical implementation approach
F Djebbar - Electronics, 2021 - mdpi.com
Adding network connectivity to any “thing” can certainly provide great value, but it also
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
brings along potential cybersecurity risks. To fully benefit from the Internet of Things “IoT” …
Message-driven generative music steganography using midi-gan
Generative steganography has become a popular research topic in the field of generative AI,
including generative image and synthetic speech steganography. However, music files have …
including generative image and synthetic speech steganography. However, music files have …