نتایج جستجو برای: blind steganalysis

تعداد نتایج: 84018  

Journal: :CoRR 2012
P. Thiyagarajan G. Aghila V. Prasanna Venkatesan

Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stegoimage database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infecte...

2005
Rainer Böhme

This paper proposes multiple regression models as a method for quantitative evaluation of the accuracy in steganalysis with respect to various moderating factors, such as parameter choice of the detector and properties of the carrier object. The case for multivariate statistical inference in steganalysis is particularly relevant: recent findings suggest that type and characteristics of carrier ...

2008
Benjamin M. Rodriguez Gilbert L. Peterson Kenneth W. Bauer

Several steganography methods are available over the Internet for hiding information within digital images. A digital forensics examiner must be able to extract a hidden message from a digital image. Extraction requires first identifying the embedding method used. Several steganalysis systems exist that identify a subset of the available embedding methods. Each steganalysis systems has its own ...

2012
P. T. Anitha S. N. Sivanandham

Steganography refers to information or file that has been concealed inside a digital media. Steganalysis is used to detect and/or estimate potentially hidden information from observed data with a little or no knowledge about the steganography algorithm and its parameters. Current trend in steganalysis seems to suggest two extreme approaches (a) little or no statistical assumption about the imag...

2013
Guoming Chen Qiang Chen Dong Zhang

The purpose of image steganalysis is to detect the presence of hidden messages in cover images. Steganalysis can be considered as a pattern recognition process to decide which class a test image belongs to: the innocent photographic image or the stego-image. We compare harmony search algorithm and particle swarm optimization algorithm based feature selection for image steganalysis. Experiment r...

2015
Tomás Pevný Andrew D. Ker

This paper considers the research goal of dependable steganalysis: where false positives occur once in a million or less, and this rate is known with high precision. Despite its importance for real-world application, there has been almost no study of steganalysis which produces very low false positives. We test existing and novel classifiers for their low false-positive performance, using milli...

2002
Faisal Alturki Russell M. Mersereau

techniques attempt to differentiate between stego-objects and cover-objects. In recent work we developed an analytic upper bound for the steganographic capacity of LSB based steganographic techniques for a given false of detection. In this paper we look at adaptive steganographic techniques. Adaptive steganographic techniques steps to escape detection. We explore different techniques that can b...

Journal: :RITA 2008
Anderson Rocha Siome Goldenstein

In this tutorial, we introduce the basic theory behind Steganography and Steganalysis, and present some recent algorithms and developments of these fields. We show how the existing techniques used nowadays are related to Image Processing and Computer Vision, point out several trendy applications of Steganography and Steganalysis, and list a few great research opportunities just waiting to be ad...

Journal: :CoRR 2018
Mehdi Yedroudj Marc Chaumont Frédéric Comby

Deep learning and convolutional neural networks (CNN) have been intensively used in many image processing topics during last years. As far as steganalysis is concerned, the use of CNN allows reaching the state-of-the-art results. The performances of such networks often rely on the size of their learning database. An obvious preliminary assumption could be considering that the bigger a database ...

2014
Madhavi B. Desai S. V. Patel

Ooverwhelming growth in communication technology and usage of internet has greatly facilitated transfer of data. The threat of unauthorized data access is increasing along with it. Since last decade, too many data hiding methods have been proposed. Because of large number of redundant bits, image has become popular carrier for data hiding techniques. The advancement in image steganography has p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید