An overview of steganography techniques applied to the protection of biometric data

M Douglas, K Bailey, M Leeney, K Curran - Multimedia Tools and …, 2018 - Springer
Identification of persons by way of biometric features is an emerging phenomenon. Over the
years, biometric recognition has received much attention due to its need for security …

Three-dimensional mesh steganography and steganalysis: A review

H Zhou, W Zhang, K Chen, W Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Three-dimensional (3-D) meshes are commonly used to represent virtual surfaces and
volumes. Over the past decade, 3-D meshes have emerged in industrial, medical, and …

Applications of machine learning in cryptography: a survey

MM Alani - Proceedings of the 3rd International Conference on …, 2019 - dl.acm.org
Machine learning techniques have had a long list of applications in recent years. However,
the use of machine learning in information and network security is not new. Machine …

Compact image steganalysis for LSB-matching steganography

O Juarez-Sandoval… - … on Biometrics and …, 2017 - ieeexplore.ieee.org
In this paper, we propose a compact image steganalysis method for the LSB-matching
steganography, in which a feature vector composed by only 12 elements is extracted from …

Moderate embed cross validated and feature reduced Steganalysis using principal component analysis in spatial and transform domain with Support Vector Machine …

DD Shankar, N Khalil, AS Azhakath - Multimedia Tools and Applications, 2023 - Springer
The fast evolution of Information and Digital technology had given way for internet to be an
effective medium for communication. This has also paved way for data exploitation …

Passive steganalysis evaluation: reliabilities of modern quantitative steganalysis algorithms

N Prokhozhev, O Mikhailichenko, A Sivachev… - Proceedings of the First …, 2016 - Springer
This paper presents initial results from experiments which perform statistically accurate
evaluation of the reliability of modern quantitative statistical steganalysis algorithms. The …

UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media

V Leask, R Cogranne, D Borghys… - Proceedings of the 17th …, 2022 - dl.acm.org
This paper presents the general goals of Horizon 2020 project UNCOVER, whose overall
purpose is to close the gap between academic work and operational needs in the fields of …

A hybrid of clustering and quantum genetic algorithm for relevant genes selection for cancer microarray data

M Sardana, RK Agrawal, B Kaur - International Journal of …, 2016 - content.iospress.com
In order to efficiently explore and exploit large search space, quantum variant of genetic
algorithm has been suggested in literature. It utilizes quantum computing principle and …

Feature selection for steganalysis based on modified Stochastic Diffusion Search using Fisher score

V Bhasin, P Bedi, A Singhal - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
The steganalysis process comprises of two major components feature extraction and
classification based on the extracted features. The high dimension of feature sets used for …

Steganalysis using LSB-focused statistical features

MM Al-Jarrah, ZH Al-Taie, A Abuarqoub - Proceedings of the …, 2017 - dl.acm.org
In this paper, we present an image steganalysis model with a new texture feature set that is
designed to take into consideration the pattern of embedding locations in a cover image …