2018
DOI: 10.1504/ijesdf.2018.10015329
|View full text |Cite
|
Sign up to set email alerts
|

Video steganalysis to obstruct criminal activities for digital forensics: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…More recently, the advent of deep learning techniques has enhanced the capabilities of image integrity detection and verification, outperforming traditional methods in several image-related tasks, especially in these where anti-forensic tools were used [109], [110], [115]. In the context of video files, we can find surveys on video steganalysis [109], [110], [116], video forgery detection [91], [92], [94], [110], [117], [118], video forensic tools [91], [109], [119], [120], video surveillance analysis [121], [122], and video content authentication [123]. Finally, digital audio forensics has also been studied in [124].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, the advent of deep learning techniques has enhanced the capabilities of image integrity detection and verification, outperforming traditional methods in several image-related tasks, especially in these where anti-forensic tools were used [109], [110], [115]. In the context of video files, we can find surveys on video steganalysis [109], [110], [116], video forgery detection [91], [92], [94], [110], [117], [118], video forensic tools [91], [109], [119], [120], video surveillance analysis [121], [122], and video content authentication [123]. Finally, digital audio forensics has also been studied in [124].…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…Standardized evaluation procedures and benchmarks [90], [94]- [96], [98], [100], [101], [104], [109]- [114], [116], [117], [123] Explore the use of novel AI methods and novel data types [88], [91], [93], [95], [99], [100], [103], [104], [106], [107], [109], [110], [112], [113], [115], [118], [121]- [124] Robust pre-processing and feature extraction [90], [91], [94], [97], [99], [101], [102], [105], [106], [109], [115], [117], [118], [121], [123], [124] Reduce training and data acquisition overheads [89], [91]…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
“…This technique allows the perpetrator to hide information by inserting the information into other messages in the form of digital media such as text, images, audio or video without arousing suspicion. [10] [11]. Computer crimes related to the misuse of steganographic techniques have been reported through the mass media, including a report from Trend Micro November 2017 with the title "REDBALDKNIGHT's Daserf Backdoor Now Using Steganography".…”
Section: Introductionmentioning
confidence: 99%