نتایج جستجو برای: steganalysis
تعداد نتایج: 823 فیلتر نتایج به سال:
Steganography is the science of hiding and communicating a secret message by embedding it in an innocent looking text such that eavesdropper unaware its existence. Previously, attempts were made to establish steganography using quantum key distribution (QKD). Recently, has been shown protocols are vulnerable certain steganalysis attack can detect presence hidden suppress entire communication. I...
In this paper, we present a consolidated formulation of conditional states from the perspective of steganalysis approach. It has been identified that the conditional states used in steganalysis approach include hypothesis testing, gaussion distribution, hidden markov model and vector analysis space. The main objective of this paper is to find the best approach to fit in using mathematical formu...
Dense local descriptors and machine learning have been used with success in several applications, like classification of textures, steganalysis, and forgery detection. We develop a new image forgery detector building upon some descriptors recently proposed in the steganalysis field suitably merging some of such descriptors, and optimizing a SVM classifier on the available training set. Despite ...
steganography of images based on the use of the LSB (Least Significant Bit), SPA (Sample Pair Analysis), RS (Regular and Singular groups) method and DIH (Difference Image Histogram) method are three powerful steganalysis methods. A comparison analysis among DIH, SPA, and RS method is discussed, and a comparison of their proofs is presented. The process of proving includes three parts, and an eq...
Steganalysis is the reverse process of steganography. The goal of steganalysis is to detect, as reliably as possible, the presence of hidden data. Software-based steganolytic systems often fail to keep up with highspeed network throughputs. In this paper, we present the design of a system that automatically detects steg-information in real-time. In this system, RS steganalytic algorithm is para...
This article presents a new method for detecting a source point of time based network steganography MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography s...
This paper presents a survey of text steganography methods used for hiding secret information inside some covertext. Widely known hiding techniques (such as translation based steganography, text generating and syntactic embedding) and detection are considered. It is shown that statistical analysis has an important role in text steganalysis.
Steganography is the art of passing information in a manner that the very existence of the message is unknown. The goal of steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages. In this paper, we identify characteristics in current ...
Steganography has received considerable press in the last three years, mostly due to the war on terror. This paper discusses the state of steganography by examining its current uses, limitations, and implications. In addition, this paper addresses the relationship between steganography, steganalysis and terrorism.
In this paper two novel steganalysis methods is presented based on co-occurrence matrix of an image. It is shown that by using features extracted from this matrix, we can differentiate between cover and stego images. These features include energy, entropy, contrast, inverse difference moment, maximum probability and correlation. We use SVM classification for separation of cover and stego imag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید