SOTAVerified

Steganalysis

Detect the usage of Steganography

Papers

Showing 5196 of 96 papers

TitleStatusHype
Detection of Classifier Inconsistencies in Image Steganalysis0
Detecting Adversarial Examples by Additional Evidence from Noise Domain0
Detection based Defense against Adversarial Examples from the Steganalysis Point of View0
DNA Steganalysis Using Deep Recurrent Neural Networks0
Double-Flow-based Steganography without Embedding for Image-to-Image Hiding0
Exploiting Language Model for Efficient Linguistic Steganalysis0
Fast and Effective Global Covariance Pooling Network for Image Steganalysis0
FIIH: Fully Invertible Image Hiding for Secure and Robust0
Forensic Video Steganalysis in Spatial Domain by Noise Residual Convolutional Neural Network0
Generalized Local Optimality for Video Steganalysis in Motion Vector Domain0
Generative Steganography Network0
Graph Representation Learning for Spatial Image Steganalysis0
Green Steganalyzer: A Green Learning Approach to Image Steganalysis0
Hiding Data in Colors: Secure and Lossless Deep Image Steganography via Conditional Invertible Neural Networks0
How to augment a small learning set for improving the performances of a CNN-based steganalyzer?0
Image forgery detection based on the fusion of machine learning and block-matching methods0
Image Generation Network for Covert Transmission in Online Social Network0
ImageNet Pretrained CNNs for JPEG Steganalysis0
Image Processing Operations Identification via Convolutional Neural Network0
Deep residual network for steganalysis of digital imagesCode0
A Secure and Disambiguating Approach for Generative Linguistic SteganographyCode0
VStegNET: Video Steganography Networkusing Spatio-Temporal features andMicro-BottleneckCode0
Yedrouj-Net: An efficient CNN for spatial steganalysisCode0
Destruction of Image Steganography using Generative Adversarial NetworksCode0
STD-NET: Search of Image Steganalytic Deep-learning Architecture via Hierarchical Tensor DecompositionCode0
GANprintR: Improved Fakes and Evaluation of the State of the Art in Face Manipulation DetectionCode0
CLPSTNet: A Progressive Multi-Scale Convolutional Steganography Model Integrating Curriculum LearningCode0
SUDS: Sanitizing Universal and Dependent SteganographyCode0
Invisible Steganography via Generative Adversarial NetworksCode0
Effective Message Hiding with Order-Preserving MechanismsCode0
Efficient Streaming Voice Steganalysis in Challenging Detection ScenariosCode0
BitMix: Data Augmentation for Image SteganalysisCode0
Using Set Covering to Generate Databases for Holistic SteganalysisCode0
IStego100K: Large-scale Image Steganalysis DatasetCode0
RNN-SM: Fast Steganalysis of VoIP Streams Using Recurrent Neural NetworkCode0
BASN -- Learning Steganography with Binary Attention MechanismCode0
Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security ImplicationsCode0
Learning Rich Features for Image Manipulation DetectionCode0
Leveraging Data Geometry to Mitigate CSM in SteganalysisCode0
Dynamically Allocated Interval-Based Generative Linguistic Steganography with Roulette WheelCode0
SteganoGAN: High Capacity Image Steganography with GANsCode0
GSDFuse: Capturing Cognitive Inconsistencies from Multi-Dimensional Weak Signals in Social Media SteganalysisCode0
Natias: Neuron Attribution based Transferable Image Adversarial SteganographyCode0
SCReedSolo: A Secure and Robust LSB Image Steganography Framework with Randomized Symmetric Encryption and Reed-Solomon CodingCode0
A study on the invariance in security whatever the dimension of images for the steganalysis by deep-learningCode0
Steganographic Generative Adversarial NetworksCode0
Show:102550
← PrevPage 2 of 2Next →

No leaderboard results yet.