نتایج جستجو برای: steganalysis

تعداد نتایج: 823  

Journal: :مهندسی برق مدرس 0
zahra jalili department of computer science, college of engineering, university of shahed tehran, iran. hedieh sajedi department of computer science, college of science, university of tehran, tehran, iran. maryam hasanzadeh department of computer science, college of engineering, university of shahed

in this paper, we proposed a data-hiding scheme based on run length matrix. in a previously proposed method, a technique based on texture classification was introduced where four statically features extracted from run length matrix; then best cover images are selected based on these features. using appropriate features for comparing images from undetectability viewpoint, guarantees, less detect...

2014
Ramandeep kaur Arshdeep Singh Chunfang Yang Fenlin Liu Xiangyang Luo

Steganography is a technique to hide/protect the information. Many people are using this technique to hide their malicious data, so that such data can not be intercepted easily. This paper deals with a review on various Stegangraphy and Steganalysis Techniques .Different papers related to steganography, classification of steganography, video steganography were studied and reviewed. The aim is t...

2012
Shailender Gupta Bharat Bhushan

Steganalysis is the art of detecting the message's existence and blockading the covert communication. Various steganography techniques have been proposed in literature. The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image is replaced with data bit. As this method is vulnerable to steganalysis so as to make it more secure we encrypt the ...

Journal: :IEICE Transactions 2010
Cong Nguyen Bui Hae-Yeoun Lee Jeong-Chun Joo Heung-Kyu Lee

A secure method for steganography is proposed. Pixelvalue differencing (PVD) steganography and bit-plane complexity segmentation (BPCS) steganography have the weakness of generating blocky effects and noise in smooth areas and being detectable with steganalysis. To overcome these weaknesses, a secure bit-plane based steganography method on the spatial domain is presented, which uses a robust me...

2005
Osman Hilmi Kocal Emrah Yuruklu Ismail Avcibas

In this paper, we investigate chaotic−type features for universal speech steganalysis. These features are used in the design of linear regression classifier. The steganalyzer is tested on watermarking and steganographic methods. Experimental results show the potential of chaotic−type features for their discriminatory power to be used in steganalysis. We believe that the integration of chaotic−t...

2007
Yoan Miché Patrick Bas Amaury Lendasse Christian Jutten Olli Simula

Steganalysis consists in classifying documents as steganographied or genuine. This paper presents a methodology for steganalysis based on a set of 193 features with two main goals: determine a sufficient number of images for effective training of a classifier in the obtained high-dimensional space, and use feature selection to select most relevant features for the desired classification. Dimens...

2012
Nanhay Singh Bhoopesh Singh Bhati R. S. Raw

This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this paper, we introduce Steganalysis for computer forensic investigation. Digital forensics is helpful in investigation of the cyber-crime and computer crime. With the...

2008
Adem Orsdemir Oktay Altun Gaurav Sharma Mark F. Bocko

We consider the interplay between steganographer and the steganalyzer, and develop a steganalysis aware framework for steganography. The problem of determining a stego image is posed as a feasibility problem subject to constraint of data communication, imperceptibility, and statistical indistinguishability with respect to steganalyzer’s features. A stego image is then determined using set theor...

2015
Chun-Yu Zhang Wen-Xiang Zhang Shao-Wei Weng

According to the research of LSB steganalysis, LSB steganography could destroy the distribution of 0 and 1 in the lowest bit planes, and this situation will cause the abnormality of histogram and asymmetry statistical, thereby left an opportunity that could be exploited to the steganalysis. From the view of steganalysis, this paper compared the two typical kinds of image scrambling methods whic...

2002
Richard E. Newman Ira S. Moskowitz LiWu Chang Murali M. Brahmadesam

Steganography and steganalysis of digital images is a catand-mouse game. In recent work, Fridrich, Goljan and Du introduced a method that is surprisingly accurate at determining if bitmap images that originated as JPEG les have b en altered (and even specifying where and how they were altered), even if only a single bit has been changed. However, steganographic embeddings that encode embedded d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید