نتایج جستجو برای: blind steganalysis

تعداد نتایج: 84018  

2007
Christian Ullerich Andreas Westfeld

Model-based steganography is a promising approach for hidden communication in JPEG images with high steganographic capacity and competitive security. In this paper we propose an attack, which is based on coefficient types that can be derived from the blockiness adjustment of MB2. We derive 30 new features to be used in combination with existing blind feature sets leading to a remarkable reducti...

Journal: :مهندسی برق مدرس 0
zahra jalili department of computer science, college of engineering, university of shahed tehran, iran. hedieh sajedi department of computer science, college of science, university of tehran, tehran, iran. maryam hasanzadeh department of computer science, college of engineering, university of shahed

in this paper, we proposed a data-hiding scheme based on run length matrix. in a previously proposed method, a technique based on texture classification was introduced where four statically features extracted from run length matrix; then best cover images are selected based on these features. using appropriate features for comparing images from undetectability viewpoint, guarantees, less detect...

2007
Xiaojun Qi Daniel Lewis

We propose a secure steganographic approach with a high capacity. We first use small neighborhoods of the original histogram to calculate the minimum remapping from a histogram to the odd-only and even-only histograms. We then employ a quantization index modulation-based odd-even embedding to preserve the histogram of each embedding subchannel. A minimum distortion remapping policy is used to d...

2003
Roman Tzschoppe Robert Bäuml Johannes B. Huber André Kaup

Universal blind steganalysis attempts to detect steganographic data without knowledge about the applied steganographic system. Farid proposed such a detection algorithm based on higher-order statistics for separating original images from stego images. His method shows an astonishing performance on current steganographic schemes. Starting from the statistical approach in Farid’s algorithm, we in...

2014
Ramandeep kaur Arshdeep Singh Chunfang Yang Fenlin Liu Xiangyang Luo

Steganography is a technique to hide/protect the information. Many people are using this technique to hide their malicious data, so that such data can not be intercepted easily. This paper deals with a review on various Stegangraphy and Steganalysis Techniques .Different papers related to steganography, classification of steganography, video steganography were studied and reviewed. The aim is t...

2012
Shailender Gupta Bharat Bhushan

Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalysis so as to make it more secure we encrypt the ...

Journal: :IEICE Transactions 2010
Cong Nguyen Bui Hae-Yeoun Lee Jeong-Chun Joo Heung-Kyu Lee

A secure method for steganography is proposed. Pixelvalue differencing (PVD) steganography and bit-plane complexity segmentation (BPCS) steganography have the weakness of generating blocky effects and noise in smooth areas and being detectable with steganalysis. To overcome these weaknesses, a secure bit-plane based steganography method on the spatial domain is presented, which uses a robust me...

2005
Osman Hilmi Kocal Emrah Yuruklu Ismail Avcibas

In this paper, we investigate chaotic−type features for universal speech steganalysis. These features are used in the design of linear regression classifier. The steganalyzer is tested on watermarking and steganographic methods. Experimental results show the potential of chaotic−type features for their discriminatory power to be used in steganalysis. We believe that the integration of chaotic−t...

2007
Yoan Miché Patrick Bas Amaury Lendasse Christian Jutten Olli Simula

Steganalysis consists in classifying documents as steganographied or genuine. This paper presents a methodology for steganalysis based on a set of 193 features with two main goals: determine a sufficient number of images for effective training of a classifier in the obtained high-dimensional space, and use feature selection to select most relevant features for the desired classification. Dimens...

2012
Nanhay Singh Bhoopesh Singh Bhati R. S. Raw

This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this paper, we introduce Steganalysis for computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime and computer crime. With the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید