Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








828 Hits in 4.1 sec

An improved LSB embedding technique for image steganography

Sherin Sugathan
2016 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT)  
In this paper, we propose a new method of non-adaptive LSB steganography in still images to improve the embedding efficiency from 2 to 8/3 random bits per one embedding change even for the embedding rate  ...  It is shown that the proposed method outperforms the security of LSB replacement, LSB matching, and LSB matching revisited by reducing the probability of detection with their current targeted steganalysis  ...  Also, it is expected to reduce the probability of detection by LSB matching steganalysis methods as well, based on the dissimilarity in pixel value transitions and its influence on the intensity histogram  ... 
doi:10.1109/icatcct.2016.7912072 fatcat:qcoiybvyajaohf5r53spblhqtq

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks

Donghui Hu, Qiang Shen, Shengnan Zhou, Xueliang Liu, Yuqi Fan, Lina Wang
2017 Security and Communication Networks  
In order to make the CNN focus on the regions with complex textures, we design a region selection method by finding a region with the maximal sum of the embedding probabilities.  ...  When detecting recently developed adaptive image steganography methods, state-of-art steganalysis methods cannot achieve satisfactory detection accuracy, because the adaptive steganography methods can  ...  Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. Acknowledgments  ... 
doi:10.1155/2017/2314860 fatcat:lvblvbd35zhofpcsnmtu47qaea

Fuzzy Localization of Steganographic Flipped Bits via Modification Map

Quanqi Liu, Tong Qiao, Ming Xu, Ning Zheng
2019 IEEE Access  
By re-embedding randomly generated messages upon one single image, we observe that adaptive steganographic methods are prone to modify pixels in the same region, namely texture region.  ...  Adaptive steganography has become unprecedentedly prevalent compared with non-adaptive ones due to its remarkable performance when resisting modern steganalysis.  ...  Next, based on the embedding probability, the universal and unified adaptive steganalytic framework was proposed in [16] .  ... 
doi:10.1109/access.2019.2920304 fatcat:2elqzk7wjzcijelmmynvhgqisu

Steganalysis of LSB Matching Revisited for Consecutive Pixels Using B-Spline Functions [chapter]

Shunquan Tan
2012 Lecture Notes in Computer Science  
The edge adaptive image steganography based on LSB matching revisited (EALSBMR) is one of the recent important achievements in this field.  ...  The edge adaptive image steganography based on LSB matching revisited (EALSBMR) is one of the recent important achievements in this field.  ... 
doi:10.1007/978-3-642-32205-1_4 fatcat:j3xmqkfsqrhtvpc34cyyharj3u

Modification ratio estimation for a category of adaptive steganography

XiangYang Luo, FenLin Liu, ChunFang Yang, ShiGuo Lian
2010 Science China Information Sciences  
For the category of adaptive steganography satisfying these conditions, a general quantitative steganalysis method is presented based on specific areas and sample pair analysis.  ...  This verifies the validity of the proposed general quantitative steganalysis method.  ...  The main steps of the general quantitative steganalysis of the adaptive steganography based on specific areas and MSPA model are as follows: I.  ... 
doi:10.1007/s11432-010-4105-7 fatcat:swbteovnsngdfibqinr4heloum

Digital image Steganalysis based on Visual Attention and Deep Reinforcement Learning

Donghui Hu, Shengnan Zhou, Qiang Shen, Shuli Zheng, Zhongqiu Zhao, Yuqi Fan
2019 IEEE Access  
In this paper, we propose a new self-seeking steganalysis method based on visual attention and deep reinforcement learning to detect the JPEG-based adaptive steganography.  ...  As the opposite art, steganalysis methods, especially some convolutional neural network-based steganalysis methods, have been proposed to detect whether an image is embedded with secret information or  ...  THE SELF-SEEKING METHOD The state-of-the-art adaptive steganography methods usually first assign a distortion value to each pixel via a distortion function based on the embedding cost, and then some advanced  ... 
doi:10.1109/access.2019.2900076 fatcat:4spn7pkjavadvp4kkugzxzdswm

An Adaptive Image Calibration Algorithm for Steganalysis

Xuyu Xiang, Jiaohua Qin, Junshan Tan, Neal N. Xiong
2019 Computers Materials & Continua  
Firstly, we analyzed the effect of steganography on the neighborhood node degree of cover images. Then, the calibratable pixels are marked by the analysis of neighborhood node degree.  ...  In this paper, a new adaptive calibration algorithm for image steganalysis is proposed. Steganography disturbs the dependence between neighboring pixels and decreases the neighborhood node degree.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2020.06394 fatcat:tmibrf4ymfeixp5iqonxms4flm

Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane

C. Yang, F. Liu, S. Lian, X. Luo, D. Wang
2011 Computer journal  
Afterward, based on this result and an estimation of cover image, a simple estimation equation is derived to estimate the embedding ratio in each bit plane.  ...  Experimental results show that the new steganalysis method performs more stably with the change of embedding ratios than typical structural steganalysis, and outperforms the typical structural steganalysis  ...  In [26] , the IDMSPA method also has been adapted for the quantitative steganalysis of a category of adaptive steganography that embeds message bits into different bit planes with different ratios based  ... 
doi:10.1093/comjnl/bxr112 fatcat:hurukf6vsnfudjueilf5jfciry

Detecting Adversarial Examples - A Lesson from Multimedia Forensics [article]

Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme
2018 arXiv   pre-print
Furthermore, we adapt a linear filter, similar to early steganalysis methods, to detect adversarial examples that are generated with the projected gradient descent (PGD) method, the state-of-the-art algorithm  ...  We test our method on the MNIST database and show for several parameter combinations of PGD that our method can reliably detect adversarial examples.  ...  Method One of the simplest and earliest steganalysis methods is based on the intuition that pixels that were changed during the embedding behave different than pixels that were not changed [14] .  ... 
arXiv:1803.03613v1 fatcat:ckvjrng5r5e25fab44segefbjy

Steganalysis of Image with Adaptively Parametric Activation [article]

Hai Su, Meiyin Han, Junle Liang, Songsen Yu
2022 arXiv   pre-print
Besides, a loss function based on contrastive learning is applied to overcome the limitations of cross-entropy loss by maximum inter-class distance.  ...  The point of steganalysis is to detect the weak embedding signals which is hardly learned by convolution-al layer and easily suppressed.  ...  Based on the above findings, adaptive parameters are more suitable for characteristics of steganalysis. Therefore, it is necessary to utilize adaptive parameters. E.  ... 
arXiv:2203.12843v1 fatcat:glxn3j2pejag5eofrolrb232ge

Image Steganography and Steganalysis: A Survey

Yambem JinaChanu, Kh. Manglem Singh, Themrichon Tuithung
2012 International Journal of Computer Applications  
Newer and more sophisticated steganographic techniques for embedding secret message will require more powerful steganalysis methods for detection.  ...  Steganography refers to the technique of hiding secret messages into media such as text, audio, image and video without any suspicion, while steganalysis is the art and science of detection of the presence  ...  PVD-based steganographic scheme is another edge adaptive scheme, in which the number of embedded bits is determined by the difference between a pixel and its neighbors [28, 50, 51] .  ... 
doi:10.5120/8171-1484 fatcat:jdrgk5sdefhbvcvzdic77pqnbq

Steganalysis for Markov Cover Data With Applications to Images

K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath
2006 IEEE Transactions on Information Forensics and Security  
In particular, several effective image steganalysis techniques are based on the strong interpixel dependencies exhibited by natural images.  ...  Thus, existing theoretical benchmarks based on independent and identically distributed (i.i.d.) models for the cover data underestimate attainable steganalysis performance and, hence, overestimate the  ...  We also compare the results of the detector based on the empirical matrix based on one adjacent pixel, and that generated from an average of four adjacent pixels.  ... 
doi:10.1109/tifs.2006.873595 fatcat:cqywze5hvjhftnqvc4ghmlxlta

Weakening the Detecting Capability of CNN-based Steganalysis [article]

Sai Ma, Qingxiao Guan, Xianfeng Zhao, Yaqi Liu
2018 arXiv   pre-print
Recently, the application of deep learning in steganalysis has drawn many researchers' attention.  ...  However, all these kinds of back-propagation based neural networks may be cheated by forging input named the adversarial example.  ...  With these beneficial exploration, deep learning based steganalysis has become one of the mainstream of research [5] .  ... 
arXiv:1803.10889v1 fatcat:vndpxapy7vcznh5efd5xolsfn4

A special detector for the edge adaptive image steganography based on LSB matching revisited

Zhenhao Zhu, Tao Zhang, Baoji Wan
2013 2013 10th IEEE International Conference on Control and Automation (ICCA)  
Based on the analysis of the pixel value difference (PVD) histograms of the cover and stego-images, a special steganalyzer is proposed for the edge adaptive image steganography based on least-significant-bit  ...  However, there exists unavoidable weakness: abnormal increasing at some position of the PVD histogram. The special steganslytic method is designed using the weakness of the EA-LSBMR steganography.  ...  ACKNOWLEDGMENT This work was supported by the National Natural Science Foundation of China (No. 60903221, 61272490) .  ... 
doi:10.1109/icca.2013.6564938 dblp:conf/icca/ZhuZW13 fatcat:kxjojfjb7jghnga4ncac7mf7yi

Toward Steganographic Payload Location via Neighboring Weight Algorithm

Tong Qiao, Xiangyang Luo, Binmin Pan, Yuxing Chen, Xiaoshuai Wu, Beijing Chen
2022 Security and Communication Networks  
Then, the random bits are embedded in the stego image based on the cost matrix in the framework of Syndrome-Trellis Codes (STCs).  ...  Modern steganalysis has been widely investigated, most of which mainly focus on dealing with the problem of detecting whether an inquiry image contains hidden information.  ...  GK219909299001-007, the National Natural Science Foundation of China (Grant nos.  ... 
doi:10.1155/2022/1400708 fatcat:dhnlujhjtngrbj4i7asvqs56re
« Previous Showing results 1 — 15 out of 828 results