Results 171 to 180 of about 3,326 (205)

Covert Communication through Robust Fragment Hiding in a Large Number of Images. [PDF]

open access: yesSensors (Basel)
Wang P   +6 more
europepmc   +1 more source

Steganalysis of YASS

IEEE Transactions on Information Forensics and Security, 2008
In this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in embedding host blocks whose locations are randomized. However, we find that the locations of the embedding
Jiwu Huang, Bin Li, Yun Q. Shi
openaire   +3 more sources

The impact of information fusion in steganalysis on the example of audio steganalysis

SPIE Proceedings, 2009
Information fusion tries to determine the best set of experts in a given problem domain and devise an appropriate function that can optimally combine the decisions of the individual experts. Only few systematic approaches to information fusion exist so far in the signal processing field of steganalysis.
Kraetzer C., Dittmann J.
openaire   +2 more sources

Channel Steganalysis

Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses an ideal background for those who wish to communicate covertly by the use of steganography.
Andre Ester   +2 more
openaire   +2 more sources

Steganalysis of facsimile

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005
Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax.
Chuntian Zhang   +4 more
openaire   +2 more sources

Steganalysis of Perturbed Quantization

2006 IEEE 14th Signal Processing and Communications Applications, 2006
Recently proposed Perturbed Quantization (PQ) data hiding is a novel steganographic scheme which is undetectable with the current steganalysis methods. In this paper PQ steganography scheme is described briefly and a novel singular value decomposition (SVD) based steganalysis method is proposed to detect PQ embedding.
Avcibas, Ismail   +2 more
openaire   +3 more sources

Steganalysis of MP3Stego

2009 International Joint Conference on Neural Networks, 2009
In this article, we propose a scheme for detecting hidden messages in compressed audio files produced by MP3Stego, as our literature search has found no previous work on successful steganalysis of MP3Stego. We extract moment statistical features on the second derivatives, as well as Markov transition features and neighboring joint density of the MDCT ...
Qingzhong Liu   +2 more
openaire   +2 more sources

On More Paradigms of Steganalysis

International Journal of Digital Crime and Forensics, 2016
Up to now, most researches on steganalysis concentrate on one extreme case. Typically, the a priori knowledge of the embedding way and cover-media is assumed known in the classifier training and even feature design stage. However, the steganalysis in the real world is done with different levels of such knowledge so that there can be various paradigms ...
Xianfeng Zhao, Jie Zhu, Haibo Yu
openaire   +2 more sources

Steganalysis of overlapping images [PDF]

open access: possibleSPIE Proceedings, 2015
We examine whether steganographic images can be detected more reliably when there exist other images, taken with the same camera under the same conditions, of the same scene. We argue that such a circumstance is realistic and likely in practice. In `laboratory conditions' mimicking circumstances favourable to the analyst, and with a custom set of ...
James M. Whitaker, Andrew D. Ker
openaire   +1 more source

Home - About - Disclaimer - Privacy