Blind Steganography Detection Using a Computational Immune System Approach: A Proposal
نویسندگان
چکیده
Research in steganalysis is motivated by the concern that communications associated with illicit activity could be hidden in seemingly innocent electronic transactions. By developing defensive tools before steganographic communication grows, computer security professionals will be better prepared for the threat. This paper proposes a computational immune system (CIS) approach to blind steganography detection. ∗The views expressed in this article are those of the authors and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the U.S. Government.
منابع مشابه
Blind Stenanography Detection Using a Computational Immune System: A Work in Progress
Research in steganalysis is motivated by the concern that communications associated with illicit activity could be hidden in seemingly innocent electronic transactions. By developing defensive tools before steganographic communication grows, computer security professionals will be better prepared for the threat. This paper proposes a computational immune system (CIS) approach to blind steganogr...
متن کاملSteganalysis with a Computational Immune System
Research in steganalysis is motivated by the concern that communications associated with illicit activity could be hidden in seemingly innocent electronic transactions. By developing defensive tools before steganographic communication grows, computer security professionals will be better prepared for the threat. This paper proposes a computational immune system (CIS) approach to blind steganogr...
متن کاملA Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain
This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملHigh capacity steganography tool for Arabic text using 'Kashida'
Steganography is the ability to hide secret information in a cover-media such as sound, pictures and text. A new approach is proposed to hide a secret into Arabic text cover media using "Kashida", an Arabic extension character. The proposed approach is an attempt to maximize the use of "Kashida" to hide more information in Arabic text cover-media. To approach this, some algorithms have been des...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002