Results 31 to 40 of about 4,115 (191)
Code wars: steganography, signals intelligence, and terrorism [PDF]
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid +11 more
core +2 more sources
Universal Unsupervised Steganalysis Forensics Algorithm Based on Outlier Detection [PDF]
In order to solve the carrier source mismatch problem in image steganalysis,a universal unsupervised steganalysis forensics algorithm combining image retrieval and outlier detection is proposed.For the measured image,The carrier images with the same ...
WU Yunda,ZHANG Tao,HOU Xiaodan,XU Chen
doaj +1 more source
There exists a need of “image steganalysis” which reveals whether steganographic signals are embedded in an image to improve information security.
Hiroya Kato +3 more
doaj +1 more source
Estimating cover image for universal payload region detection in stego images
With the increase in digital communication, images have become indispensable media for carrying obscured communication these days. Unraveling the presence or details of obscured transmission also known as steganography is termed as steganalysis.
Punam Bedi, Anuradha Singhal
doaj +1 more source
Convolutional neural network-based methods are attracting increasing attention in steganalysis. However, steganalysis for content-adaptive image steganography in the spatial domain is still a difficult problem.
Zhili Xiang +5 more
doaj +1 more source
A Steganography Algorithm Based on CycleGAN for Covert Communication in the Internet of Things
With the wide application of the Internet of Things (IoT), the risk of data leakage and theft in IoT is gradually increasing since communication channel is public in data transmission.
Ruohan Meng +4 more
doaj +1 more source
Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection
Deep neural networks (DNN) are applied in various fields because they afford good performance. However, they seem vulnerable to adversarial examples. Therefore, studies are actively investigating adversarial defenses to improve the robustness of DNNs as ...
Hyunsik Na, Gwonsang Ryu, Daeseon Choi
doaj +1 more source
Image steganalysis for digital forensics [PDF]
Στην σημερινή εποχή, η στεγανογραφία είναι ο κύριος τρόπος για την επίτευξη παράνομης μυστικής επικοινωνίας. Ως εκ τούτου, η ανάγκη ανίχνευσης στεγανογραφικού περιεχομένου και ιδίως στεγανογραφημένων εικόνων γίνεται επιτακτική. Ωστόσο, η στεγανάλυση είναι ένα πολύ δύσκολο έργο και η επιτυχία της εξαρτάται από πολλούς παράγοντες, όπως η παρουσία του ...
openaire +1 more source
Steganalysis of binary images [PDF]
With an increasing use of digital binary images including text, graphic and halftone images in daily life, security of the digital binary images such as certificate, transcript, scanning hard copy to electronic copy etc. is a big concern. Such a concern makes data hiding in binary images an important and attractive research topic in recent years ...
openaire +3 more sources
Detection of Classifier Inconsistencies in Image Steganalysis [PDF]
In this paper, a methodology to detect inconsistencies in classification-based image steganalysis is presented. The proposed approach uses two classifiers: the usual one, trained with a set formed by cover and stego images, and a second classifier trained with the set obtained after embedding additional random messages into the original training set ...
Lerch Hostalot, Daniel +1 more
openaire +3 more sources

