نتایج جستجو برای: blind steganalysis

تعداد نتایج: 84018  

2007
Benjamin M. Rodriguez Gilbert L. Peterson Sos S. Agaian

Images and data files provide an excellent opportunity for concealing illegal or clandestine material. Currently, there are over 250 different tools which embed data into an image without causing noticeable changes to the image. From a forensics perspective, when a system is confiscated or an image of a system is generated the investigator needs a tool that can scan and accurately identify file...

Dramatic changes in digital communication and exchange of image, audio, video and text files result in a suitable field for interpersonal transfers of hidden information. Therefore, nowadays, preserving channel security and intellectual property and access to hidden information make new fields of researches naming steganography, watermarking and steganalysis. Steganalysis as a binary classifica...

2009
ROSHIDI DIN AZMAN SAMSUDIN

This paper presents gives a consolidated view of digital media steganalysis from the perspective of computational intelligence (CI). The environment of digital media steganalysis can be divided into three (3) domains which are image steganalysis, audio steganalysis, and video steganalysis. Three (3) major methods have also been identified in the computational intelligence based on these stegana...

Journal: :Annales UMCS, Informatica 2012
Ashraf M. Emam Mahmoud M. Ouf

Steganalysis is the art of detecting the presence of hidden data in files. In the last few years, there have been a lot of methods provided for steganalysis. Each method gives a good result depending on the hiding method. This paper aims at the evaluation of five universal steganalysis techniques which are “Wavelet based steganalysis”, “Feature Based Steganalysis”, “Moments of characteristic fu...

2017
Jean-François Couchot Raphaël Couturier Michel Salomon

Conventional state-of-the-art image steganalysis approaches usually consist of a classifier trained with features provided by rich image models. As both features extraction and classification steps are perfectly embodied in the deep learning architecture called Convolutional Neural Network (CNN), different studies have tried to design a CNN-based steganalyzer. The network designed by Xu et al. ...

Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...

2010
Christian Kraetzer Jana Dittmann

In the paper we extend an existing information fusion based audio steganalysis approach by three different kinds of evaluations: The first evaluation addresses the so far neglected evaluations on sensor level fusion. Our results show that this fusion removes content dependability while being capable of achieving similar classification rates (especially for the considered global features) if com...

2004
Shalin P. Trivedi Rajarathnam Chandramouli

Kernel Fisher discriminant for steganalysis of JPEG hiding methods p. 13 On estimation of secret message length in LSB steganography in spatial domain p. 23 Steganalysis using color wavelet statistics and one-class support vector machines p. 35 Steganalysis using modified pixel comparison and complexity measure p. 46 Performance evaluation of blind steganalysis classifiers p. 58 Searching for t...

2014
Manveer Kaur Gagandeep Kaur

Steganography and steganalysis received a great deal of attention from media and law enforcement. Many powerful and robust methods of steganography and steganalysis have been developed. In this paper we are considering the methods of steganalysis that are to be used for this processes. Paper giving some idea about the steganalysis and its method. Keywords— Include at least 5 keywords or phrases

2017
Hamzeh Ghasemzadeh Mohammad H. Kayvanrad

Recently, merging signal processing techniques with information security services has found a lot of attention. Steganography and steganalysis are among those trends. Like their counterparts in cryptology, steganography and steganalysis are in a constant battle. Steganography methods try to hide the presence of covert messages in innocuouslooking data, whereas steganalysis methods try to reveal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید