2021
DOI: 10.1049/ipr2.12272
|View full text |Cite
|
Sign up to set email alerts
|

IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network

Abstract: Information hiding aims to embed a crucial amount of confidential data records into the multimedia, such as text, audio, static and dynamic image, and video. Image-based information hiding has been a significantly important topic for digital forensics. Here, active image deep steganographic approaches have come forward for hiding data. The least significant bit (LSB) steganography approach is proposed to conceal a secret message into the original image. First, the lightweight stream encryption cryptography enc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

4
5

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 30 publications
0
21
0
Order By: Relevance
“…The primary objective of using blockchain is to protect critical data organizations of data to gratify the particular kind of data that will be preserved on the digital ledger using the blockchain technology along with the process of storage, such as off-chain and on-chain data preservation storage [44]. In the higher education degree attestation, the overall data is more sensitive and confidential; therefore, the data must be preserved and checked against and investigate the hashes of on-chain.…”
Section: Cross-chainingmentioning
confidence: 99%
See 1 more Smart Citation
“…The primary objective of using blockchain is to protect critical data organizations of data to gratify the particular kind of data that will be preserved on the digital ledger using the blockchain technology along with the process of storage, such as off-chain and on-chain data preservation storage [44]. In the higher education degree attestation, the overall data is more sensitive and confidential; therefore, the data must be preserved and checked against and investigate the hashes of on-chain.…”
Section: Cross-chainingmentioning
confidence: 99%
“…The HEC regulatory authority plays an important role to manage the standards of degree attestation and verification including the secrecy of candidate certificate credentials and authenticity, checking system quality and maintainability, safety, data protectability, sensibility, resource effectiveness, transfer and exchange records between the universities and federal education authorities. These regulatory authorities look after the complete mechanism of retrieval, preserve, share, transfer, store, and exchange degree, attestation, and verification related data records, and more crucial to provide transparency, scalability, cross-chaining, and security [43,44]. In this way, the degree traceability limitations and issues can be solved with more efficiency, and they can be reorganized to deliver a better educational solution for HEC.…”
Section: Hec Standardization and Compliances Limitationsmentioning
confidence: 99%
“…As the HED survey reported, over one-fourth of submitted applications admit that there is no pre-verified work done by the university before submitting them to HED for attestation and verification. Every year, more than 150,000 forged certificates are issued [10,11]. These misrepresented applications outperform their peers in the market for seeking jobs in highly competitive environments.…”
Section: Introductionmentioning
confidence: 99%
“…The trade of the energy and power grid system shifted from the centralized to the distributed smart power grid system; the development of the current distributed energy business model has encountered critical bottlenecks and implementation challenges [7]. The current multimedia-enabled decentralized cloud management of energy business models is highly relying on third-party services [8]. Thus, this will cause a single point of failure; moreover, it will lead to increased operating costs, potential risk and low node transaction transparency, and a high possibility of data forgery and tampering.…”
Section: Introductionmentioning
confidence: 99%