Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer

H Li, Y Zhang, J Wang, W Zhang… - Chinese Journal of …, 2024 - ieeexplore.ieee.org
Existing deep learning-based steganography detection methods utilize convolution to
automatically capture and learn steganographic features, yielding higher detection efficiency …

Global texture sensitive convolutional transformer for medical image steganalysis

Z Zhou, K Chen, D Hu, H Shu, G Coatrieux… - Multimedia …, 2024 - Springer
Steganography is often used by hackers or illegal organizations as a vehicle for information
interception of medical images. Exchanged between PACS or communicated during …

A novel method for linguistic steganography by English translation using attention mechanism and probability distribution theory

YQ Lin, ZH Wang - Plos one, 2024 - journals.plos.org
To enhance our ability to model long-range semantical dependencies, we introduce a novel
approach for linguistic steganography through English translation. This method leverages …

General Steganalysis of Generative Linguistic Steganography Based on Dynamic Segment-level Lexical Association Extraction

S Li, H Du, J Wang - IEEE Signal Processing Letters, 2024 - ieeexplore.ieee.org
In scenarios where steganographic texts from various steganographic domains generated
by different generative steganography algorithms are mixed, most existing linguistic …

Spatio-temporal graph Convolution Transformer for Video Question Answering

J Tang, J Hu, W Huang, S Shen, J Pan, D Wang… - IEEE …, 2024 - ieeexplore.ieee.org
Currently, video question answering (VideoQA) algorithms relying on video-text pretraining
models employ intricate unimodal encoders and multimodal fusion Transformers, which …

State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research

Y Wang, R Zhang, Y Tang, J Liu - … International Conference on …, 2023 - ieeexplore.ieee.org
With the evolution of generative linguistic steganography techniques, conventional
steganalysis falls short in robustly quantifying the alterations induced by steganography …

Generative Adversarial Networks for Artificial Satellite Image Creation and Manipulation

S Ghelichkhani, YAMAD Salem, H Salahov… - Adversarial Multimedia …, 2023 - Springer
In the research conducted and reported herein, we demonstrate the ability to generate and
manipulate synthetic satellite images by employing a set of deep learning architectures (DL) …

CATS: Connection-Aware and Interaction-Based Text Steganalysis in Social Networks

K Pang, J Yang, Y Gao, M Bai, Z Yang, M Jiang… - … Conference on Neural …, 2023 - Springer
The generative linguistic steganography in social networks have potential huge abuse and
regulatory risks, with serious implications for information security, especially in the era of …

Linguistic Steganography and Linguistic Steganalysis

H Wu, T Yang, X Zheng, Y Fang - Adversarial Multimedia Forensics, 2023 - Springer
The objective of linguistic steganography is to embed additional data in text carriers for
covert communication, whereas linguistic steganalysis, as a counter technology to linguistic …

An Enhanced Text Steganography Technique (SHA-Logic): Based on Conditional Logic and SHA-3 (Secure Hash Algorithm 3)

KD Michelle, OG Gilibrays… - Journal of Independent …, 2024 - jisrc.szabist.edu.pk
Text teganography is a method used to hide confidential messages in a message's text
without arousing suspicion. This technique has been used in the past, from ancient Greece's …