Skip to main content

New Advances on Intelligent Multimedia Hiding and Forensics

  1. Social media plays an increasingly important role in providing information and social support to users. Due to the easy dissemination of content, as well as difficulty to track on the social network, we are mo...

    Authors: Yanyang Guo, Hanzhou Wu and Xinpeng Zhang
    Citation: EURASIP Journal on Image and Video Processing 2021 2021:5
  2. Social e-commerce has been a hot topic in recent years, with the number of users increasing year by year and the transaction money exploding. Unlike traditional e-commerce, the main activities of social e-comm...

    Authors: Haoliang Cui, Shuai Shao, Shaozhang Niu, Chengjie Shi and Lingyu Zhou
    Citation: EURASIP Journal on Image and Video Processing 2021 2021:4
  3. The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image. Therefore, thi...

    Authors: Jie Wang, Chunfang Yang, Ma Zhu, Xiaofeng Song, Yuan Liu and Yuemeng Lian
    Citation: EURASIP Journal on Image and Video Processing 2021 2021:1
  4. Chinese named entity recognition (CNER) in the judicial domain is an important and fundamental task in the analysis of judgment documents. However, only a few researches have been devoted to this task so far. ...

    Authors: Wenming Huang, Dengrui Hu, Zhenrong Deng and Jianyun Nie
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:52
  5. Artificial intelligence has been widely studied on solving intelligent surveillance analysis and security problems in recent years. Although many multimedia security approaches have been proposed by using deep...

    Authors: Xu Cheng, Chen Song, Yongxiang Gu and Beijing Chen
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:51
  6. Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis...

    Authors: Zhangjie Fu, Fan Wang and Xu Cheng
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:46
  7. In (k,n) secret sharing scheme, one secret is encrypted into n shares in such a way that only k or more shares can decrypt the secret. Secret sharing scheme can be extended into the field of multimedia that provi...

    Authors: Zheng Ma, Yan Ma, Xiaohong Huang, Manjun Zhang and Yanxiao Liu
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:42
  8. When embedding secret message into image by steganography with matrix encoding, there are still no effective methods to recover the stego key because it is difficult to statistically distinguish the stego coef...

    Authors: Jiufen Liu, Chunfang Yang, Junchao Wang and Yanan Shi
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:40
  9. Since the concept of coverless information hiding was proposed, it has been greatly developed due to its effectiveness of resisting the steganographic tools. Most existing coverless image steganography (CIS) m...

    Authors: Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan and Yao Qiu
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:39
  10. In order to protect the intellectual property of neural network, an owner may select a set of trigger samples and their corresponding labels to train a network, and prove the ownership by the trigger set witho...

    Authors: Renjie Zhu, Xinpeng Zhang, Mengte Shi and Zhenjun Tang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:37
  11. To fundamentally resist the steganalysis, coverless information hiding has been proposed, and it has become a research hotspot in the field of covert communication. However, the current methods not only requir...

    Authors: Yi Cao, Zhili Zhou, Q. M. Jonathan Wu, Chengsheng Yuan and Xingming Sun
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:36
  12. In this paper, a new reversible data hiding scheme in encrypted binary image is proposed by shared pixel prediction and halving compression. We first divide binary image into non-overlapping pure color blocks ...

    Authors: Fengyong Li, Lianming Zhang and Weimin Wei
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:33
  13. As a large number of images are transmitted through social networks every moment, terrorists may hide data into images to convey secret data. Various types of images are mixed up in the social networks, and it...

    Authors: Huaqi Wang, Zhenxing Qian, Guorui Feng and Xinpeng Zhang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:30
  14. In recent years, researchers have been making great progress in the steganalysis technology based on convolution neural networks (CNN). However, experts ignore the contribution of nonlinear residual and joint ...

    Authors: Ze Wang, Mingzhi Chen, Yu Yang, Min Lei and Zhexuan Dong
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:28
  15. Due to the fact that coverless information hiding can effectively resist the detection of steganalysis tools, it has attracted more attention in the field of information hiding. At present, most coverless info...

    Authors: Nan Pan, Jiaohua Qin, Yun Tan, Xuyu Xiang and Guimin Hou
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:23
  16. Image hashing is an efficient technology for processing digital images and has been successfully used in image copy detection, image retrieval, image authentication, image quality assessment, and so on. In thi...

    Authors: Zhenjun Tang, Hanyun Zhang, Shenglian Lu, Heng Yao and Xianquan Zhang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:21
  17. The traditional information hiding is realized by embedding the secret information into the multimedia, but it will inevitably leave the modification mark in the carrier. This paper proposed a new method of co...

    Authors: Xintao Duan, Baoxia Li, Daidou Guo, Zhen Zhang and Yuanyuan Ma
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:18
  18. Geolocation of covert communication entity is significantly important for the forensics of the crime but has significant challenges when the steganalyst locks the guilty actor IP and wants to know the physical...

    Authors: Fan Zhang, Fenlin Liu and Xiangyang Luo
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:15

    The Correction to this article has been published in EURASIP Journal on Image and Video Processing 2023 2023:2

  19. Semi-structured data is a widely used text format for data interchange and storage. This paper proposes a robust watermarking scheme of data protection for semi-structured data, which uses JSON format as an ex...

    Authors: Jiahuan He, Qichao Ying, Zhenxing Qian, Guorui Feng and Xinpeng Zhang
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:12
  20. Deep neural networks are vulnerable to adversarial samples, posing potential threats to the applications deployed with deep learning models in practical conditions. A typical example is the fingerprint livenes...

    Authors: Jianwei Fei, Zhihua Xia, Peipeng Yu and Fengjun Xiao
    Citation: EURASIP Journal on Image and Video Processing 2020 2020:1