Results 171 to 180 of about 3,467 (203)
Some of the next articles are maybe not open access.

Model based steganalysis

2004 International Conference on Image Processing, 2004. ICIP '04., 2005
In this paper, we consider a new method for performing steganalysis using a statistical model of the cover medium. Using model based methodology, examples of detecting secret message and estimating the secret message length of bit-streams embedded using JSteg-like steganography and quantization index modulation are proposed. This steganalysis technique
null Xiaoyi Yu   +2 more
openaire   +1 more source

MP3 audio steganalysis

Information Sciences, 2013
MP3, one of the most widely used digital audio formats, provides a high compression ratio with faithful quality. The widespread use enables MP3 audio files to become excellent covers to carry hidden information in audio steganography on the Internet.
Mengyu Qiao   +2 more
openaire   +2 more sources

Steganalysis of facsimile

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005
Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax.
null Yunbiao Guo   +4 more
openaire   +1 more source

Steganalysis of YASS

IEEE Transactions on Information Forensics and Security, 2008
In this paper, we describe a method for attacking Yet Another Steganographic Scheme (YASS), which is designed to be a very secure JPEG steganographic algorithm. The success of YASS is attributed to its innovation in embedding, i.e., hiding data in embedding host blocks whose locations are randomized. However, we find that the locations of the embedding
Bin Li, Yun Q. Shi, Jiwu Huang
openaire   +1 more source

Universal Batch Steganalysis

2014
Abstract : Steganography is the hiding of information within an innocent cover': such a technology is becoming increasingly desirable for those who wish to evade network monitoring or to disguise their circle of correspondents. On the other hand, it presents a challenge for those with a legitimate need to monitor networks. The aim of steganalysis is to
Andrew D. Ker, Tomas Pevny
openaire   +2 more sources

Passive Steganalysis Evaluation: Reliabilities of Modern Quantitative Steganalysis Algorithms

2016
This paper presents initial results from experiments which perform statistically accurate evaluation of the reliability of modern quantitative statistical steganalysis algorithms. The focus here is on the algorithms for detection of simple LSB steganography in grayscale images. The following algorithms were evaluated: RS- analysis, Sample pair analysis,
N. Prokhozhev   +4 more
openaire   +1 more source

Hardware Based Steganalysis

2008
Steganalysis is the reverse process of steganography. The goal of steganalysis is to detect, as reliably as possible, the presence of hidden data. Softwarebased steganolytic systems often fail to keep up with high-speed network throughputs. In this chapter, we present the design of a system that automatically detects steg-information in real-time.
Kang Sun   +3 more
openaire   +1 more source

Double Embedding Steganalysis

Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses a ideal background for those who wish to communicate covertly by the use of steganography.
Martin Steinebach   +3 more
openaire   +1 more source

Towards dependable steganalysis

SPIE Proceedings, 2015
This paper considers the research goal of dependable steganalysis: where false positives occur once in a million or less, and this rate is known with high precision. Despite its importance for real-world application, there has been almost no study of steganalysis which produces very low false positives.
Tomáš Pevný, Andrew D. Ker
openaire   +1 more source

Benchmarking Steganalysis

2011
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are used to measure detection accuracy, with different authors using incompatible benchmarks. Thus it is difficult to make a fair comparison of competing steganalysis methods.
openaire   +1 more source

Home - About - Disclaimer - Privacy