نتایج جستجو برای: blind steganalysis

تعداد نتایج: 84018  

2015
Julien Sebastien Jainsky

In this chapter, we discuss the topic of security in wireless visual sensor networks. In particular, attention is brought to steganographic security and how it can be discouraged without challenging the primary objectives of the network. We motivate the development and implementation of more lightweight steganalytic solutions that take into account the resources made available by the network’s ...

2012
Medha Kulkarni J. W. Bakal

Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...

2011
Mayra Bachrach Frank Y. Shih

Image steganography is used to embed covert messages in the form of files, text, or other images in digital images. The intent is to transmit hidden information. Steganalysis is the process used to detect hidden messages in images. Although steganography is not a new discipline, it has become increasingly important in today’s digital world where information is often and easily exchanged through...

Journal: :CoRR 2011
P. Thiyagarajan G. Aghila V. Prasanna Venkatesan

The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence o...

2005
André R. S. Marçal Patricia R. Pereira

Digital images are increasingly being used as steganographic covers for secret communication. The Least Significant Bit (LSB) encoding is one of the most widely used methods for embedding a message in a digital image. However, the direct application of LSB encoding is vulnerable to steganalysis. For example, RS steganalysis is very efficient in detecting the presence of a message in a digital i...

2013
Julien S. Jainsky Deepa Kundur

Issues of security and privacy in surveillance systems are abound. Much focus has been put toward developing security strategies for emerging wireless visual sensor networks. Solutions target protection of the overt communication channel. However, given the characteristics of these networks which include shared resources, high degrees of collaboration and the presence of redundancy and uncertai...

2013
Indradip Banerjee

“Maintain the security of the secret informat ion”, this words has been a great challenge in our day to day life. Sender can send messages regularly through a communicat ion channel like Internet, draws the attention of third parties, hackers and crackers, perhaps causing attempts to break and expose the unusual messages. Steganography is a gifted region which is used for secured data transmiss...

2015
Jaikishan Jalan

Steganalysis deals with identifying the instances of medium(s) which carry a message for communication by concealing their exisitence. This research focuses on steganalysis of JPEG images, because of its ubiquitous nature and low bandwidth requirement for storage and transmission. JPEG image steganalysis is generally addressed by representing an image with lower-dimensional features such as sta...

2014
Indradip Banerjee

‘Steganalysis’ is one of the challenging and attractive interests for the researchers with the development of information hiding techniques. It is the procedure to detect the hidden information from the stego created by known steganographic algorithm. paper, a novel feature based image steganalysis technique is proposed. Various statistical moments have been used along with some similarity metr...

2010
Yoan Miche Patrick Bas Amaury Lendasse

The quantitative steganalysis problem aims at estimating the amount of payload embedded inside a document. In this paper, JPEG images are considered, and by the use of a re-embedding based methodology, it is possible to estimate the number of original embedding changes performed on the image by a stego source and to slightly improve the estimation regarding classical quantitative steganalysis m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید