نتایج جستجو برای: blind steganalysis
تعداد نتایج: 84018 فیلتر نتایج به سال:
The increasing use of steganography requires digital forensic examiners to consider the extraction of hidden information from digital images encountered during investigations. The first step in extraction is to identify the embedding method. Several steganalysis systems have been developed for this purpose, but each system only identifies a subset of the available embedding methods and with var...
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can...
Quantitative steganalysis aims to estimate the amount of payload in a stego object, and such estimators seem to arise naturally in steganalysis of Least Significant Bit (LSB) replacement in digital images. However, as with all steganalysis, the estimators are subject to errors, and their magnitude seems heavily dependent on properties of the cover. In very recent work we have given the first de...
The Steganography is the science of communication of secret information using carrier/s between two or multiple entities. The secret information can be embedded into an existing image, audio or video or even as a complex combination of all three. In case the secret feature is visible, attention & attack is inevitable & evident, our primary goal is to creatively engineer concealment of the secre...
Image complexity and feature mining for steganalysis of least significant bit matching steganography
The information-hiding ratio is a well-known metric for evaluating steganalysis performance. In this paper, we introduce a new metric of image complexity to enhance the evaluation of steganalysis performance. In addition, we also present a scheme of steganalysis of least significant bit (LSB) matching steganography, based on feature mining and pattern recognition techniques. Compared to other w...
This paper presents a consolidated view of the computational intelligence used in the natural language steganalysis. In order to understand the human intelligence on natural language, four major computational intelligence methods have been identified. They are bayesian, fuzzy logic, neural network, and genetic algorithm. This paper also presents a measurement tool to measure the natural languag...
In the last few years, we have seen many new and powerful steganography and steganalysis techniques reported in the literature. In the following paper we go over some general concepts and ideas that apply to steganography and steganalysis. Specifically we establish a framework and define notion of security for a steganographic system. We show how conventional definitions do not really adequatel...
This paper examines the effects upon steganalysis classifier performance of introducing superfluous variation into digital cover images . By using fixed steganography and steganalysis tools (Steghide 0.5.1 for former and Stegdetect 0.6 for latter), a number of different image filters are individually applied to cover images prior to the introduction of steganographic content; the effect of thes...
In the past few years, we have witnessed a number of powerful steganalysis technique proposed in the literature. These techniques could be categorized as either specific or universal. Each category of techniques has a set of advantages and disadvantages. A steganalysis technique specific to a steganographic embedding technique would perform well when tested only on that method and might fail on...
The overwhelming growth in communication technology and usage of public domain channels (i.e. Internet) has greatly facilitated transfer of data. However, such open communication channels have greater vulnerability to security threats causing unauthorized information access. Steganography is the art of hiding and transmitting data through apparently innocuous carriers such as text, image, audio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید