supported in part by the Zhejiang Provincial Natural Science Foundation of China under Grant LQ20F020004;in part by the National College Student Innovation and Research Training Program under Grant 202313283002.
With the rapid advancement of Voice over Internet Protocol(VoIP)technology,speech steganography techniques such as Quantization Index Modulation(QIM)and Pitch Modulation Steganography(PMS)have emerged as significant c...
supported by the National Natural Science Foundation of China(No.62372062)。
Three-dimensional (3D) point cloud information hiding algorithms are mainly concentrated in the spatialdomain. Existing spatial domain steganalysis algorithms are subject to more disturbing factors during the analysis...
supported by the National Key Research and Development Program of China(No.2022YFB3102900);the National Natural Science Foundation of China(Nos.62172435,62202495 and 62002103);Zhongyuan Science and Technology Innovation Leading Talent Project of China(No.214200510019);Key Research and Development Project of Henan Province(No.2211321200);the Natural Science Foundation of Henan Province(No.222300420058).
The rapid development of the internet and digital media has provided convenience while also posing a potential risk of steganography abuse.Identifying steganographer is essential in tracing secret information origins ...
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)algorithm.Image steganography,a technique of embedding hidden information in digital photographs,shoul...
National Natural Science Foundation of China (Grant Nos. 62172435, 62202495, and U2336206);National Key Research and Development Program of China (Grant No. 2022 YFB3102900);Zhongyuan Science and Technology Innovation Leading Talent Project, China (Grant No. 214200510019);Key Research and Development Project of Henan Province (Grant No. 221111321200)。
Existing deep learning-based steganography detection methods utilize convolution to automatically capture and learn steganographic features, yielding higher detection efficiency compared to manually designed steganogr...
the National Natural Science Foundation of China(Grant Nos.62272478,62202496,61872384).
Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detectio...
supported by the Ministry of Education,Culture,Research and Technology,The Republic of Indonesia,and Institut Teknologi Sepuluh Nopember.
Hiding secret data in digital multimedia has been essential to protect the data.Nevertheless,attackers with a steganalysis technique may break them.Existing steganalysis methods have good results with conventional Mac...
financially supported by the Deanship of Scientific Research at King Khalid University under Research Grant Number(R.G.P.2/549/44).
Algorithms for steganography are methods of hiding data transfers in media files.Several machine learning architectures have been presented recently to improve stego image identification performance by using spatial i...
supported by the National Natural Science Foundation of China(Nos.61872448,62172435,62072057);the Science and Technology Research Project of Henan Province in China(No.222102210075).
The training images with obviously different contents to the detected images will make the steganalysis model perform poorly in deep steganalysis.The existing methods try to reduce this effect by discarding some featu...
supported in part by the China Guangxi Science and Technology Plan Project(Guangxi Science and Technology Base and Talent Special Project)(No.2022AC20001);Chile CONICYT FONDECYT Regular Project(No.1181809);the Chile CONICYT FONDEF Program(No.ID16I10466).
Recently, many steganalysis approaches improve their feature extraction ability through addingconvolutional layers. However, it often leads to a decrease of resolution in the feature map during downsampling,which make...