A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography
2016
KSII Transactions on Internet and Information Systems
The existing steganalysis method based on 2D Gabor filters can achieve a competitive detection performance for content-adaptive JPEG steganography. ...
To solve this problem, a new steganalysis method is proposed for content-adaptive JPEG steganography by selecting the optimal 2D Gabor filters. ...
for three content-adaptive JPEG steganography. ...
doi:10.3837/tiis.2017.01.029
fatcat:iu7qsd5ebfejhnirgszeiz6mxe
Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection
2017
KSII Transactions on Internet and Information Systems
In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. ...
of the latest content-adaptive JPEG steganography algorithms. ...
So far, many steganalysis methods have been proposed for the detection of content-adaptive JPEG steganography. ...
doi:10.3837/tiis.2017.11.023
fatcat:jvabdypz4jgxdijtie3v2vgkia
A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis
2020
KSII Transactions on Internet and Information Systems
The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis. ...
Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques ...
Quality of Dataset: Steganalyzers for content adaptive steganography shows worse detection performance when dataset contain images with different content complexities. ...
doi:10.3837/tiis.2020.03.017
fatcat:7ci7bfbjsfd2nn5yagnv2h3ora
Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges
[article]
2021
arXiv
pre-print
In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and ...
Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including ...
maximize the detection capabilities of the content adaptive algorithms like HUGO. ...
arXiv:2110.02504v1
fatcat:wz5hnqeixrcdjc4afoyycjp7ui
Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection
2019
IEEE Access
For current steganalysis of the image content-adaptive steganography, there are multiple problems to be improved, such as high difficulty and low accuracy, when detecting images with various contents and ...
At the same time, the analysis and experimental results in this paper also show that the images with rich content and complex texture should be paid more attention both in steganography and in steganalysis ...
and feature selection for content-adaptive steganography is illustrated in Fig. 2 . ...
doi:10.1109/access.2019.2896781
fatcat:eitzvefqgve2vfr52cqfkkqlfq
Textural features based universal steganalysis
2008
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
We also report the detection performance on JPEG steganography and JPEG2000 steganography. ...
This paper takes the task of image steganalysis as a texture classification problem. The impact of steganography to an image is viewed as the alteration of image texture in a fine scale. ...
INTRODUCTION Recent years witness growing interests in the field of digital steganography and steganalysis 1,2,3 . ...
doi:10.1117/12.765817
dblp:conf/sswmc/LiHS08
fatcat:uxit3kpc4vafhki4ox6sndwxf4
A Review on Steganalysis Techniques: From Image Format Point of View
2014
International Journal of Computer Applications
Many studies focus on review the steganalysis algorithm based on steganography and steganalysis classification. ...
General Terms Cover image, stego image, steganography, Keywords Steganalysis, Multimedia documents, Image format, frequency domain steganalysis, spatial domain steganalysis. ...
They suggest incorporating an adaptive pixel selection mechanism for the identification of suitable data-carrying pixels to alleviate this shortcoming in the steganography. ...
doi:10.5120/17802-8617
fatcat:7qrsdifxvfdlzh6rqtdyjpxr34
A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm
2012
American Journal of Applied Sciences
This method can be used for internet/network security. ...
Conclusion: We anticipate that this study can also give a clear picture of the current trends in Steganography and the experimental results indicate this method is valid in steganalysis. ...
Fig. 3: Steganography based document For these features which have more effected by data hiding process, neural network will assign larger weight coefficients and for these features which have less effected ...
doi:10.3844/ajassp.2012.766.771
fatcat:ovuedlyyknhf7mqw6ggrulufvm
Further study on YASS: steganography based on randomized embedding to resist blind steganalysis
2008
Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
Moreover, for the same embedding rate, the proposed steganographic schemes are more undetectable than the popular matrix embedding based F5 scheme, using features proposed by Pevny and Fridrich for blind ...
Continuing to focus on JPEG image steganography, we present, in this paper, a further study on YASS with the goal of improving the rate of embedding. ...
In Table 9 , we provide the steganalysis results using the PF-274 features for a JPEG image dataset with QF i = 95. ...
doi:10.1117/12.767893
dblp:conf/sswmc/SarkarSM08a
fatcat:cpawuca5x5htfhhnlpsr76fxrm
Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images
2014
ACM Transactions on Intelligent Systems and Technology
systems including DCT-embedding-based adaptive steganography and Yet Another Steganographic Scheme (YASS). ...
We have designed a method targeting the detection of both steganography and seam-carved forgery in JPEG images. ...
Chunhua Chen for providing us the code for Markov feature extraction. Special thanks go to Dr. Jessica Fridrich and Dr. ...
doi:10.1145/2560365
fatcat:4mjvzbls6bcnjmqsd6mmhl5kmi
An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients
2012
2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Steganography is the art of covert communication. This paper presents an efficient JPEG steganography scheme based on the block entropy of DCT coefficients and syndrome trellis coding (STC). ...
In this way, the total distortions are significantly reduced, which corresponds to less detectability of steganalysis. ...
This paper presents a new JPEG steganographic scheme which utilizes STC encoding based on a content adaptive distortion function. ...
doi:10.1109/icassp.2012.6288246
dblp:conf/icassp/WangN12
fatcat:ymodppzmebfkff7wxpoyzc7iou
Image Steganography and Steganalysis: A Survey
2012
International Journal of Computer Applications
The battle between steganography and steganalysis is never ending. In this paper, an extensive review report is presented for steganography and steganalysis. ...
Newer and more sophisticated steganographic techniques for embedding secret message will require more powerful steganalysis methods for detection. ...
The most popular image format is JPEG and it is an ideal target for steganography. ...
doi:10.5120/8171-1484
fatcat:jdrgk5sdefhbvcvzdic77pqnbq
Deep Learning Applied to Steganalysis of Digital Images: A Systematic Review
2019
IEEE Access
Likewise thanks to the project UN-UCALDAS Computational prototype for the fusion and analysis of large volumes of data in IoT (Internet of Things) environments, based on Machine Learning techniques and ...
by testing more steganographic algorithms in the JPEG domain. • Adapt the GAN methodology to do steganalysis in the spatial domain and also use it to do automatic steganography in the JPEG domain. • Adjust ...
Currently, steganography is done adaptively, that is, it takes into account the content of the image to introduce the message in regions where it is more difficult to be detected by the steganographers ...
doi:10.1109/access.2019.2918086
fatcat:3o5mgkiyn5aj5ltdscr3cqr4by
Digital image Steganalysis based on Visual Attention and Deep Reinforcement Learning
2019
IEEE Access
In this paper, we propose a new self-seeking steganalysis method based on visual attention and deep reinforcement learning to detect the JPEG-based adaptive steganography. ...
methods when attacking the adaptive steganography methods. ...
Most of current steganalysis methods (detailed in Section 2) rely on designing more effective features to improve the detection performance for adaptive JPEG steganography. ...
doi:10.1109/access.2019.2900076
fatcat:4spn7pkjavadvp4kkugzxzdswm
An effective image steganalysis method based on neighborhood information of pixels
2011
2011 18th IEEE International Conference on Image Processing
We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of -rotation invariant‖ property to reduce the dimensionality for the whole feature sets. ...
This paper focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. ...
Steganography and steganalysis are two complementary techniques for secret communication scenario. ...
doi:10.1109/icip.2011.6116231
dblp:conf/icip/GuanDT11
fatcat:5eehpwuxi5cefjhwomdzxsrcly
« Previous
Showing results 1 — 15 out of 487 results