Results 31 to 40 of about 5,168 (229)
Secure Cover Selection for Steganography
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis,
Zichi Wang, Xinpeng Zhang
doaj +1 more source
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu +4 more
doaj +1 more source
A multi-task learning CNN for image steganalysis [PDF]
Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether ...
Li, Chang-Tsun +4 more
core +1 more source
Revisiting weighted stego-image steganalysis
This paper revisits the steganalysis method involving a Weighted Stego-Image (WS) for estimating LSB replacement payload sizes in digital images. It suggests new WS estimators, upgrading the method's three components: cover pixel prediction, least-squares weighting, and bias correction.
Ker, A, Böhme, R
openaire +1 more source
A study on the false positive rate of Stegdetect [PDF]
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz +13 more
core +1 more source
The secure steganography for hiding images via GAN
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj +1 more source
Color image steganalysis based on channel gradient correlation
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the ...
Yuhan Kang +5 more
doaj +1 more source
Code wars: steganography, signals intelligence, and terrorism [PDF]
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid +11 more
core +2 more sources
Universal Unsupervised Steganalysis Forensics Algorithm Based on Outlier Detection [PDF]
In order to solve the carrier source mismatch problem in image steganalysis,a universal unsupervised steganalysis forensics algorithm combining image retrieval and outlier detection is proposed.For the measured image,The carrier images with the same ...
WU Yunda,ZHANG Tao,HOU Xiaodan,XU Chen
doaj +1 more source
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions [PDF]
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Boudreau, Eric +4 more
core +3 more sources

