Results 21 to 30 of about 4,115 (191)

Image Steganalysis with Binary Similarity Measures [PDF]

open access: yesEURASIP Journal on Advances in Signal Processing, 2005
We present a novel technique for steganalysis of images that have been subjected to embedding by steganographic algorithms. The seventh and eighth bit planes in an image are used for the computation of several binary similarity measures. The basic idea is that the correlation between the bit planes as well as the binary texture characteristics within ...
Sankur, B   +3 more
openaire   +3 more sources

Secure Cover Selection for Steganography

open access: yesIEEE Access, 2019
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis,
Zichi Wang, Xinpeng Zhang
doaj   +1 more source

A multi-task learning CNN for image steganalysis [PDF]

open access: yes, 2018
Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether ...
Li, Chang-Tsun   +4 more
core   +1 more source

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

Revisiting weighted stego-image steganalysis

open access: yesSPIE Proceedings, 2008
This paper revisits the steganalysis method involving a Weighted Stego-Image (WS) for estimating LSB replacement payload sizes in digital images. It suggests new WS estimators, upgrading the method's three components: cover pixel prediction, least-squares weighting, and bias correction.
Ker, A, Böhme, R
openaire   +1 more source

The secure steganography for hiding images via GAN

open access: yesEURASIP Journal on Image and Video Processing, 2020
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj   +1 more source

Digital Image Steganalysis Based on Visual Attention and Deep Reinforcement Learning

open access: yesIEEE Access, 2019
Recently, the adaptive steganography methods have been developed to embed secret information with the minimal distortion of images. As the opposite art, steganalysis methods, especially some convolutional neural network-based steganalysis methods, have ...
Donghui Hu   +5 more
doaj   +1 more source

Multi-resolution network based image steganalysis model

open access: yesIntelligent and Converged Networks, 2023
Recently, many steganalysis approaches improve their feature extraction ability through adding convolutional layers. However, it often leads to a decrease of resolution in the feature map during downsampling, which makes it challenging to extract weak ...
Zimiao Wang, Jinsong Wu
doaj   +1 more source

Color image steganalysis based on channel gradient correlation

open access: yesInternational Journal of Distributed Sensor Networks, 2019
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the ...
Yuhan Kang   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy