Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








487 Hits in 5.3 sec

Optimal Gabor Filters for Steganalysis of Content-Adaptive JPEG Steganography

2016 KSII Transactions on Internet and Information Systems  
The existing steganalysis method based on 2D Gabor filters can achieve a competitive detection performance for content-adaptive JPEG steganography.  ...  To solve this problem, a new steganalysis method is proposed for content-adaptive JPEG steganography by selecting the optimal 2D Gabor filters.  ...  for three content-adaptive JPEG steganography.  ... 
doi:10.3837/tiis.2017.01.029 fatcat:iu7qsd5ebfejhnirgszeiz6mxe

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection

2017 KSII Transactions on Internet and Information Systems  
In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection.  ...  of the latest content-adaptive JPEG steganography algorithms.  ...  So far, many steganalysis methods have been proposed for the detection of content-adaptive JPEG steganography.  ... 
doi:10.3837/tiis.2017.11.023 fatcat:jvabdypz4jgxdijtie3v2vgkia

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis

2020 KSII Transactions on Internet and Information Systems  
The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis.  ...  Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques  ...  Quality of Dataset: Steganalyzers for content adaptive steganography shows worse detection performance when dataset contain images with different content complexities.  ... 
doi:10.3837/tiis.2020.03.017 fatcat:7ci7bfbjsfd2nn5yagnv2h3ora

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges [article]

Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham
2021 arXiv   pre-print
In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and  ...  Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including  ...  maximize the detection capabilities of the content adaptive algorithms like HUGO.  ... 
arXiv:2110.02504v1 fatcat:wz5hnqeixrcdjc4afoyycjp7ui

Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection

Jicang Lu, Gang Zhou, Chunfang Yang, Zhenyu Li, Mingjing Lan
2019 IEEE Access  
For current steganalysis of the image content-adaptive steganography, there are multiple problems to be improved, such as high difficulty and low accuracy, when detecting images with various contents and  ...  At the same time, the analysis and experimental results in this paper also show that the images with rich content and complex texture should be paid more attention both in steganography and in steganalysis  ...  and feature selection for content-adaptive steganography is illustrated in Fig. 2 .  ... 
doi:10.1109/access.2019.2896781 fatcat:eitzvefqgve2vfr52cqfkkqlfq

Textural features based universal steganalysis

Bin Li, Jiwu Huang, Yun Q. Shi, Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon
2008 Security, Forensics, Steganography, and Watermarking of Multimedia Contents X  
We also report the detection performance on JPEG steganography and JPEG2000 steganography.  ...  This paper takes the task of image steganalysis as a texture classification problem. The impact of steganography to an image is viewed as the alteration of image texture in a fine scale.  ...  INTRODUCTION Recent years witness growing interests in the field of digital steganography and steganalysis 1,2,3 .  ... 
doi:10.1117/12.765817 dblp:conf/sswmc/LiHS08 fatcat:uxit3kpc4vafhki4ox6sndwxf4

A Review on Steganalysis Techniques: From Image Format Point of View

Sherif MBadr, Goada Ismaial, Ashgan H. Khalil
2014 International Journal of Computer Applications  
Many studies focus on review the steganalysis algorithm based on steganography and steganalysis classification.  ...  General Terms Cover image, stego image, steganography, Keywords Steganalysis, Multimedia documents, Image format, frequency domain steganalysis, spatial domain steganalysis.  ...  They suggest incorporating an adaptive pixel selection mechanism for the identification of suitable data-carrying pixels to alleviate this shortcoming in the steganography.  ... 
doi:10.5120/17802-8617 fatcat:7qrsdifxvfdlzh6rqtdyjpxr34

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

Alejandro
2012 American Journal of Applied Sciences  
This method can be used for internet/network security.  ...  Conclusion: We anticipate that this study can also give a clear picture of the current trends in Steganography and the experimental results indicate this method is valid in steganalysis.  ...  Fig. 3: Steganography based document For these features which have more effected by data hiding process, neural network will assign larger weight coefficients and for these features which have less effected  ... 
doi:10.3844/ajassp.2012.766.771 fatcat:ovuedlyyknhf7mqw6ggrulufvm

Further study on YASS: steganography based on randomized embedding to resist blind steganalysis

Anindya Sarkar, Kaushal Solanki, B. S. Manjunath, Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon
2008 Security, Forensics, Steganography, and Watermarking of Multimedia Contents X  
Moreover, for the same embedding rate, the proposed steganographic schemes are more undetectable than the popular matrix embedding based F5 scheme, using features proposed by Pevny and Fridrich for blind  ...  Continuing to focus on JPEG image steganography, we present, in this paper, a further study on YASS with the goal of improving the rate of embedding.  ...  In Table 9 , we provide the steganalysis results using the PF-274 features for a JPEG image dataset with QF i = 95.  ... 
doi:10.1117/12.767893 dblp:conf/sswmc/SarkarSM08a fatcat:cpawuca5x5htfhhnlpsr76fxrm

Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images

Qingzhong Liu, Zhongxue Chen
2014 ACM Transactions on Intelligent Systems and Technology  
systems including DCT-embedding-based adaptive steganography and Yet Another Steganographic Scheme (YASS).  ...  We have designed a method targeting the detection of both steganography and seam-carved forgery in JPEG images.  ...  Chunhua Chen for providing us the code for Markov feature extraction. Special thanks go to Dr. Jessica Fridrich and Dr.  ... 
doi:10.1145/2560365 fatcat:4mjvzbls6bcnjmqsd6mmhl5kmi

An efficient JPEG steganographic scheme based on the block entropy of DCT coefficients

Chang Wang, Jiangqun Ni
2012 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
Steganography is the art of covert communication. This paper presents an efficient JPEG steganography scheme based on the block entropy of DCT coefficients and syndrome trellis coding (STC).  ...  In this way, the total distortions are significantly reduced, which corresponds to less detectability of steganalysis.  ...  This paper presents a new JPEG steganographic scheme which utilizes STC encoding based on a content adaptive distortion function.  ... 
doi:10.1109/icassp.2012.6288246 dblp:conf/icassp/WangN12 fatcat:ymodppzmebfkff7wxpoyzc7iou

Image Steganography and Steganalysis: A Survey

Yambem JinaChanu, Kh. Manglem Singh, Themrichon Tuithung
2012 International Journal of Computer Applications  
The battle between steganography and steganalysis is never ending. In this paper, an extensive review report is presented for steganography and steganalysis.  ...  Newer and more sophisticated steganographic techniques for embedding secret message will require more powerful steganalysis methods for detection.  ...  The most popular image format is JPEG and it is an ideal target for steganography.  ... 
doi:10.5120/8171-1484 fatcat:jdrgk5sdefhbvcvzdic77pqnbq

Deep Learning Applied to Steganalysis of Digital Images: A Systematic Review

Tabares-Soto Reinel, Ramos-Pollan Raul, Isaza Gustavo.
2019 IEEE Access  
Likewise thanks to the project UN-UCALDAS Computational prototype for the fusion and analysis of large volumes of data in IoT (Internet of Things) environments, based on Machine Learning techniques and  ...  by testing more steganographic algorithms in the JPEG domain. • Adapt the GAN methodology to do steganalysis in the spatial domain and also use it to do automatic steganography in the JPEG domain. • Adjust  ...  Currently, steganography is done adaptively, that is, it takes into account the content of the image to introduce the message in regions where it is more difficult to be detected by the steganographers  ... 
doi:10.1109/access.2019.2918086 fatcat:3o5mgkiyn5aj5ltdscr3cqr4by

Digital image Steganalysis based on Visual Attention and Deep Reinforcement Learning

Donghui Hu, Shengnan Zhou, Qiang Shen, Shuli Zheng, Zhongqiu Zhao, Yuqi Fan
2019 IEEE Access  
In this paper, we propose a new self-seeking steganalysis method based on visual attention and deep reinforcement learning to detect the JPEG-based adaptive steganography.  ...  methods when attacking the adaptive steganography methods.  ...  Most of current steganalysis methods (detailed in Section 2) rely on designing more effective features to improve the detection performance for adaptive JPEG steganography.  ... 
doi:10.1109/access.2019.2900076 fatcat:4spn7pkjavadvp4kkugzxzdswm

An effective image steganalysis method based on neighborhood information of pixels

Qingxiao Guan, Jing Dong, Tieniu Tan
2011 2011 18th IEEE International Conference on Image Processing  
We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of -rotation invariant‖ property to reduce the dimensionality for the whole feature sets.  ...  This paper focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones.  ...  Steganography and steganalysis are two complementary techniques for secret communication scenario.  ... 
doi:10.1109/icip.2011.6116231 dblp:conf/icip/GuanDT11 fatcat:5eehpwuxi5cefjhwomdzxsrcly
« Previous Showing results 1 — 15 out of 487 results