Results 1 to 10 of about 728 (183)

A comprehensive review of video steganalysis [PDF]

open access: yesIET Image Processing, 2022
AbstractSteganography is the art of secret communication and steganalysis is the art of detecting the hidden messages embedded in digital media covers. One of the covers that is gaining interest in the field is video. Presently, the global IP video traffic forms the major part of all consumer Internet traffic.
Mourad Bouzegza   +3 more
openaire   +2 more sources

How to Pretrain for Steganalysis [PDF]

open access: yesProceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security, 2021
In this paper, we investigate the effect of pretraining CNNs on Ima-geNet on their performance when refined for steganalysis of digital images. In many cases, it seems that just 'seeing' a large number of images helps with the convergence of the network during the refinement no matter what the pretraining task is.
Butora, Jan   +2 more
openaire   +3 more sources

Steganalysis of transcoding steganography [PDF]

open access: yesannals of telecommunications - annales des télécommunications, 2013
13 pages, 7 figures, 2 ...
Krzysztof Szczypiorski   +2 more
openaire   +2 more sources

The ALASKA Steganalysis Challenge [PDF]

open access: yesProceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
This paper presents ins and outs of the ALASKA challenge, a steganalysis challenge built to reflect the constraints of a forensic steganalyst. We motivate and explain the main differences w.r.t. the BOSS challenge (2010), specifically the use of a ranking metric prescribing high false positive rates, the analysis of a large diversity of different image
Remi Cogranne   +2 more
openaire   +2 more sources

Steganalysis of Hydan [PDF]

open access: yes, 2009
Hydan is a steganographic tool which can be used to hide any kind of information inside executable files. In this work, we present an efficient distinguisher for it: We have developed a system that is able to detect executable files with embedded information through Hydan.
Arturo Ribagorda   +4 more
openaire   +3 more sources

Cover-aware Steganalysis

open access: yesJournal of Cyber Security and Mobility, 2021
The increasing digitization offers new ways, possibilities and needs for a secure transmission of information. Steganography and its analysis constitute an essential part of IT-Security. In this work we show how methods of blind-steganalysis can be improved to work in cover-aware scenarios, we will call this non-blind steganalysis.
Niklas Bunzel   +2 more
openaire   +3 more sources

Progressive Randomization for Steganalysis [PDF]

open access: yes2006 IEEE Workshop on Multimedia Signal Processing, 2006
In this paper, we describe a new methodology to detect the presence of hidden digital content in the Least Significant Bits (LSB) of images. We introduce the Progressive Randomization (PR) technique that captures statistical artifacts inserted during the hiding process.
Anderson Rocha, Siome Goldenstein
openaire   +2 more sources

Steganalysis of Chat based Steganography

open access: yesInternational Journal of Informatics and Applied Mathematics, 2023
Steganalysis is the practice of identifying potential secret communication and taking appropriate action, such as deciphering to uncover the hidden contents or destroying the object containing the hidden information if it cannot be uncovered. At times, it’s very necessary to perform Steganalysis due to the fact that steganography is often ...
openaire   +2 more sources

Steganalysis into the Wild: How to Define a Source? [PDF]

open access: yesElectronic Imaging, 2018
It is now well known that practical steganalysis using machine learning techniques can be strongly biased by the problem of Cover Source Mismatch. Such a phenomenon usually occurs in machine learning when the training and the testing sets are drawn from different sources, i.e. when they do not share the same statistical properties.
Giboulot, Quentin   +2 more
openaire   +7 more sources

Steganalysis in resized images [PDF]

open access: yes2013 IEEE International Conference on Acoustics, Speech and Signal Processing, 2013
It is well known that the security of a given steganographic algorithm strongly depends on the statistical properties of the cover source. In this paper, we study how downsampling affects steganographic security. The secure payload no longer scales according to the square-root law because resizing changes the statistical properties of the cover source.
Jan Kodovsky, Jessica Fridrich
openaire   +2 more sources

Home - About - Disclaimer - Privacy