Results 31 to 40 of about 5,168 (229)

Secure Cover Selection for Steganography

open access: yesIEEE Access, 2019
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis,
Zichi Wang, Xinpeng Zhang
doaj   +1 more source

A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks

open access: yesIEEE Access, 2018
The security of image steganography is an important basis for evaluating steganography algorithms. Steganography has recently made great progress in the long-term confrontation with steganalysis.
Donghui Hu   +4 more
doaj   +1 more source

A multi-task learning CNN for image steganalysis [PDF]

open access: yes, 2018
Convolutional neural network (CNN) based image steganalysis are increasingly popular because of their superiority in accuracy. The most straightforward way to employ CNN for image steganalysis is to learn a CNN-based classifier to distinguish whether ...
Li, Chang-Tsun   +4 more
core   +1 more source

Revisiting weighted stego-image steganalysis

open access: yesSPIE Proceedings, 2008
This paper revisits the steganalysis method involving a Weighted Stego-Image (WS) for estimating LSB replacement payload sizes in digital images. It suggests new WS estimators, upgrading the method's three components: cover pixel prediction, least-squares weighting, and bias correction.
Ker, A, Böhme, R
openaire   +1 more source

A study on the false positive rate of Stegdetect [PDF]

open access: yes, 2013
In this paper we analyse Stegdetect, one of the well-known image steganalysis tools, to study its false positive rate. In doing so, we process more than 40,000 images randomly downloaded from the Internet using Google images, together with 25,000 images ...
Benjamin Aziz   +13 more
core   +1 more source

The secure steganography for hiding images via GAN

open access: yesEURASIP Journal on Image and Video Processing, 2020
Steganography is one of the important methods in the field of information hiding, which is the technique of hiding secret data within an ordinary file or message in order to avoid the detection of steganalysis models and human eyes. In recent years, many
Zhangjie Fu, Fan Wang, Xu Cheng
doaj   +1 more source

Color image steganalysis based on channel gradient correlation

open access: yesInternational Journal of Distributed Sensor Networks, 2019
It is one of the potential threats to the Internet of Things to reveal confidential messages by color image steganography. The existing color image steganalysis algorithm based on channel geometric transformation measures owns higher accuracy than the ...
Yuhan Kang   +5 more
doaj   +1 more source

Code wars: steganography, signals intelligence, and terrorism [PDF]

open access: yes, 2003
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been ...
Alex P. Schmid   +11 more
core   +2 more sources

Universal Unsupervised Steganalysis Forensics Algorithm Based on Outlier Detection [PDF]

open access: yesJisuanji gongcheng, 2017
In order to solve the carrier source mismatch problem in image steganalysis,a universal unsupervised steganalysis forensics algorithm combining image retrieval and outlier detection is proposed.For the measured image,The carrier images with the same ...
WU Yunda,ZHANG Tao,HOU Xiaodan,XU Chen
doaj   +1 more source

Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions [PDF]

open access: yes, 1999
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability ...
Boudreau, Eric   +4 more
core   +3 more sources

Home - About - Disclaimer - Privacy