New advancements in cybersecurity: A comprehensive survey

MA Hassan, S Ali, M Imad, S Bibi - Big Data Analytics and Computational …, 2022 - Springer
World is now considered as global village because of interconnected networks. Smart
phones and large computing devices exchange millions of information each day. Information …

Adversarial batch image steganography against CNN-based pooled steganalysis

L Li, W Zhang, C Qin, K Chen, W Zhou, N Yu - Signal Processing, 2021 - Elsevier
The application of adversarial embedding in single image steganography exhibits its
advantage in resisting convolutional neural network (CNN)-based steganalysis. As an …

Computational intelligence in intelligent transportation systems: an overview

MD Hina, A Soukane, A Ramdane-Cherif - Innovative trends in …, 2022 - Springer
Computational intelligence refers to the ability of a computing device or machine to learn
specific tasks based on its data and experience. Computational intelligence is invoked as an …

Computational intelligence for information security: A survey

R Wang, W Ji - IEEE Transactions on Emerging Topics in …, 2020 - ieeexplore.ieee.org
Information security is the set of processes that protect information away from unauthorized
access, disclosure, replication, modification, or destruction. Recently, more and more real …

Generative focused feedback residual networks for image steganalysis and hidden information reconstruction

Z Lai, X Zhu, J Wu - Applied Soft Computing, 2022 - Elsevier
Image steganalysis is the process of detecting the presence of hidden information in an
image. Existing image steganalysis methods cannot fully extract hidden image information …

[HTML][HTML] Security breach prediction using Artificial Neural Networks

J Jagannathan, MYM Parvees - Measurement: Sensors, 2022 - Elsevier
These days, there are many sophisticated and swiftly moving cyberthreats. Artificial Neural
Networks (ANN) are used to introduce machine learning models that boost security and add …

Deep clustering network for steganographer detection using latent features extracted from a novel convolutional autoencoder

E Amrutha, S Arivazhagan, WSL Jebarani - Neural Processing Letters, 2023 - Springer
Steganography is typically used by law enforcement agencies to prevent unauthorized
persons from becoming aware of the existence of a message communicated by military or …

Steganographer detection via a similarity accumulation graph convolutional network

Z Zhang, M Zheng, S Zhong, Y Liu - Neural Networks, 2021 - Elsevier
Steganographer detection aims to identify guilty users who conceal secret information in a
number of images for the purpose of covert communication in social networks. Existing …

Digital Image Steganographer Identification: A Comprehensive Survey.

Q Zhang, Y Zhang, Y Ma, Y Liu… - Computers, Materials & …, 2024 - search.ebscohost.com
The rapid development of the internet and digital media has provided convenience while
also posing a potential risk of steganography abuse. Identifying steganographer is essential …

Content-adaptive selective steganographer detection via embedding probability estimation deep networks

M Zheng, J Jiang, S Wu, S Zhong, Y Liu - Neurocomputing, 2019 - Elsevier
Steganographer detection is to detect culprit users, who attempt to hide confidential
information with steganography, among many innocent users. By incorporating the …