Results 171 to 180 of about 3,326 (205)
Covert Communication through Robust Fragment Hiding in a Large Number of Images. [PDF]
Wang P+6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Information Forensics and Security, 2008
In this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in embedding host blocks whose locations are randomized. However, we find that the locations of the embedding
Jiwu Huang, Bin Li, Yun Q. Shi
openaire +3 more sources
In this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in embedding host blocks whose locations are randomized. However, we find that the locations of the embedding
Jiwu Huang, Bin Li, Yun Q. Shi
openaire +3 more sources
The impact of information fusion in steganalysis on the example of audio steganalysis
SPIE Proceedings, 2009Information fusion tries to determine the best set of experts in a given problem domain and devise an appropriate function that can optimally combine the decisions of the individual experts. Only few systematic approaches to information fusion exist so far in the signal processing field of steganalysis.
Kraetzer C., Dittmann J.
openaire +2 more sources
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses an ideal background for those who wish to communicate covertly by the use of steganography.
Andre Ester+2 more
openaire +2 more sources
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses an ideal background for those who wish to communicate covertly by the use of steganography.
Andre Ester+2 more
openaire +2 more sources
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005
Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax.
Chuntian Zhang+4 more
openaire +2 more sources
Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax.
Chuntian Zhang+4 more
openaire +2 more sources
Steganalysis of Perturbed Quantization
2006 IEEE 14th Signal Processing and Communications Applications, 2006Recently proposed Perturbed Quantization (PQ) data hiding is a novel steganographic scheme which is undetectable with the current steganalysis methods. In this paper PQ steganography scheme is described briefly and a novel singular value decomposition (SVD) based steganalysis method is proposed to detect PQ embedding.
Avcibas, Ismail+2 more
openaire +3 more sources
2009 International Joint Conference on Neural Networks, 2009
In this article, we propose a scheme for detecting hidden messages in compressed audio files produced by MP3Stego, as our literature search has found no previous work on successful steganalysis of MP3Stego. We extract moment statistical features on the second derivatives, as well as Markov transition features and neighboring joint density of the MDCT ...
Qingzhong Liu+2 more
openaire +2 more sources
In this article, we propose a scheme for detecting hidden messages in compressed audio files produced by MP3Stego, as our literature search has found no previous work on successful steganalysis of MP3Stego. We extract moment statistical features on the second derivatives, as well as Markov transition features and neighboring joint density of the MDCT ...
Qingzhong Liu+2 more
openaire +2 more sources
On More Paradigms of Steganalysis
International Journal of Digital Crime and Forensics, 2016Up to now, most researches on steganalysis concentrate on one extreme case. Typically, the a priori knowledge of the embedding way and cover-media is assumed known in the classifier training and even feature design stage. However, the steganalysis in the real world is done with different levels of such knowledge so that there can be various paradigms ...
Xianfeng Zhao, Jie Zhu, Haibo Yu
openaire +2 more sources
Steganalysis of overlapping images [PDF]
We examine whether steganographic images can be detected more reliably when there exist other images, taken with the same camera under the same conditions, of the same scene. We argue that such a circumstance is realistic and likely in practice. In `laboratory conditions' mimicking circumstances favourable to the analyst, and with a custom set of ...
James M. Whitaker, Andrew D. Ker
openaire +1 more source