نتایج جستجو برای: blind steganalysis

تعداد نتایج: 84018  

2008
Benjamin M. Rodriguez Gilbert L. Peterson Kenneth W. Bauer

The increasing use of steganography requires digital forensic examiners to consider the extraction of hidden information from digital images encountered during investigations. The first step in extraction is to identify the embedding method. Several steganalysis systems have been developed for this purpose, but each system only identifies a subset of the available embedding methods and with var...

2016
Ahlem Fatnassi Hamza Gharsellaoui Sadok Bouamama

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can...

2007
Andrew D. Ker

Quantitative steganalysis aims to estimate the amount of payload in a stego object, and such estimators seem to arise naturally in steganalysis of Least Significant Bit (LSB) replacement in digital images. However, as with all steganalysis, the estimators are subject to errors, and their magnitude seems heavily dependent on properties of the cover. In very recent work we have given the first de...

2013
Sarita R. Visavalia Amit Ganatra

The Steganography is the science of communication of secret information using carrier/s between two or multiple entities. The secret information can be embedded into an existing image, audio or video or even as a complex combination of all three. In case the secret feature is visible, attention & attack is inevitable & evident, our primary goal is to creatively engineer concealment of the secre...

Journal: :Inf. Sci. 2008
Qingzhong Liu Andrew H. Sung Bernardete Ribeiro Mingzhen Wei Zhongxue Chen Jianyun Xu

The information-hiding ratio is a well-known metric for evaluating steganalysis performance. In this paper, we introduce a new metric of image complexity to enhance the evaluation of steganalysis performance. In addition, we also present a scheme of steganalysis of least significant bit (LSB) matching steganography, based on feature mining and pattern recognition techniques. Compared to other w...

2009
ROSHIDI DIN AZMAN SAMSUDIN

This paper presents a consolidated view of the computational intelligence used in the natural language steganalysis. In order to understand the human intelligence on natural language, four major computational intelligence methods have been identified. They are bayesian, fuzzy logic, neural network, and genetic algorithm. This paper also presents a measurement tool to measure the natural languag...

2003
Rajarathnam Chandramouli Mehdi Kharrazi Nasir D. Memon

In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following paper we go over some general concepts and ideas that apply to steganography and steganalysis. Specifically we establish a framework and define notion of security for a steganographic system. We show how conventional definitions do not really adequatel...

2013
Rod Hilton Derek Kern

This paper examines the effects upon steganalysis classifier performance of introducing superfluous variation into digital cover images . By using fixed steganography and steganalysis tools (Steghide 0.5.1 for former and Stegdetect 0.6 for latter), a number of different image filters are individually applied to cover images prior to the introduction of steganographic content; the effect of thes...

2006
Mehdi Kharrazi Husrev T. Sencar Nasir D. Memon

In the past few years, we have witnessed a number of powerful steganalysis technique proposed in the literature. These techniques could be categorized as either specific or universal. Each category of techniques has a set of advantages and disadvantages. A steganalysis technique specific to a steganographic embedding technique would perform well when tested only on that method and might fail on...

2013
Rita Chhikara Latika Singh

The overwhelming growth in communication technology and usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channels have greater vulnerability to security threats causing unauthorized information access. Steganography is the art of hiding and transmitting data through apparently innocuous carriers such as text, image, audio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید