نتایج جستجو برای: blind steganalysis

تعداد نتایج: 84018  

Journal: :EURASIP J. Information Security 2009
Yoan Miché Patrick Bas Amaury Lendasse Christian Jutten Olli Simula

This paper proposes to determine a sufficient number of images for reliable classification and to use feature selection to select most relevant features for achieving reliable steganalysis. First dimensionality issues in the context of classification are outlined, and the impact of the different parameters of a steganalysis scheme (the number of samples, the number of features, the steganograph...

Journal: :CoRR 2017
Ming-ming Liu Minqing Zhang Jia Liu Ying-nan Zhang Yan Ke

Traditional image steganography modifies the content of the image more or less, it is hard to resist the detection of image steganalysis tools. To address this problem, a novel method named generative coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is re...

2011
Shen Wang Bian Yang Xiamu Niu

With the extensive application of steganography, it is challenged by steganalysis. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis, we presents a new steganography based on genetic algorithm in this paper. After embedding the secret message in LSB (least significant ...

2004
Mehmet Utku Celik Gaurav Sharma A. Murat Tekalp

The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Statistical steganalysis exploits these irregularities in order to provide the best...

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

Journal: :CoRR 2017
Hamzeh Ghasemzadeh

Comparing popularity of mp3 and wave with the amount of works published on each of them shows mp3 steganalysis has not found adequate attention. Furthermore, investigating existing works on mp3 steganalysis shows that a major factor has been overlooked. Experimenting with different mp3 encoders shows there are subtle differences in their outputs. This shows that mp3 standard has been implemente...

Journal: :IEEE Transactions on Information Forensics and Security 2010

2012
Tae Hee Park Il Kyu Eom

This paper presents an image steganalysis scheme based on interand intrascale wavelet subband correlations. The image is decomposed into eight pairs of interscale subbands and the joint characteristic function moments are extracted as features. Also we extract singular values from characteristic function moments of co-occurrence value for intrascale wavelet subbands in the same scale. Extracted...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید