The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022‏ - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

[HTML][HTML] Towards realising secure and efficient image and video processing applications on quantum computers

AM Iliyasu - Entropy, 2013‏ - mdpi.com
Exploiting the promise of security and efficiency that quantum computing offers, the basic
foundations leading to commercial applications for quantum image processing are …

Watermarking and authentication of quantum images based on restricted geometric transformations

AM Iliyasu, PQ Le, F Dong, K Hirota - Information Sciences, 2012‏ - Elsevier
A secure, keyless, and blind watermarking and authentication strategy for images on
quantum computers, WaQI, is proposed based on restricted geometric transformations. In …

Quantum image edge detection using improved Sobel mask based on NEQR

R Chetia, SMB Boruah, PP Sahu - Quantum Information Processing, 2021‏ - Springer
Recently, image edge detection using quantum image processing has focused due to
having less circuit complexity and storage capacity. Edge extraction using the Sobel …

Temporal derivative-based spectrum and mel-cepstrum audio steganalysis

Q Liu, AH Sung, M Qiao - IEEE Transactions on Information …, 2009‏ - ieeexplore.ieee.org
To improve a recently developed mel-cepstrum audio steganalysis method, we present in
this paper a method based on Fourier spectrum statistics and mel-cepstrum coefficients …

Development of secrete images in image transferring system

HK Bhuyan, A Vijayaraj, V Ravi - Multimedia Tools and Applications, 2023‏ - Springer
This paper addresses a model to secrete the information of one image under another
without losing quality of image. Different approaches have been utilized for image hiding as …

A new steganography method which preserves histogram: Generalization of LSB++

K Qazanfari, R Safabakhsh - Information Sciences, 2014‏ - Elsevier
Histogram-based steganalysis methods diagnose abnormalities in the stego histogram.
LSB+ and outguess are two steganography methods which preserve the cover histogram …

Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images

Q Liu, Z Chen - ACM Transactions on Intelligent Systems and …, 2014‏ - dl.acm.org
Steganalysis and forgery detection in image forensics are generally investigated separately.
We have designed a method targeting the detection of both steganography and seam …

Tongue shape classification by geometric features

B Huang, J Wu, D Zhang, N Li - Information Sciences, 2010‏ - Elsevier
Traditional Chinese Medicine diagnoses a wide range of health conditions by examining
features of the tongue, including its shape. This paper presents a classification approach for …

LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis

DC Lou, CH Hu - Information Sciences, 2012‏ - Elsevier
Statistical steganalysis schemes detect the existence of secret information embedded by
steganography. The x2-detection and Regular-Singular (RS)-attack methods are two well …