Results 181 to 190 of about 3,326 (205)
Some of the next articles are maybe not open access.

Steganography and Steganalysis

2006
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent.
Merrill Warkentin   +2 more
openaire   +1 more source

Steganalysis

2011
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared based on critical parameters such as the hidden message detection probability, accuracy of the estimated hidden message length and secret key, and so forth.
Hafiz Malik   +2 more
openaire   +1 more source

An Ensemble of Classifiers Approach to Steganalysis

2010 20th International Conference on Pattern Recognition, 2010
Most work on steganalysis, except a few exceptions, have primarily focused on providing features with high discrimination power without giving due consideration to issues concerning practical deployment of steganalysis methods. In this work, we focus on machine learning aspect of steganalyzer design and utilize a hierarchical ensemble of classifiers ...
DİRİK, AHMET EMİR   +3 more
openaire   +4 more sources

Model based steganalysis

2004 International Conference on Image Processing, 2004. ICIP '04., 2005
In this paper, we consider a new method for performing steganalysis using a statistical model of the cover medium. Using model based methodology, examples of detecting secret message and estimating the secret message length of bit-streams embedded using JSteg-like steganography and quantization index modulation are proposed. This steganalysis technique
Xiaoyi Yu, Yunhong Wang, Tieniu Tan
openaire   +2 more sources

Steganalysis

2008
Publisher Summary This chapter focuses on steganalysis—ways to attack steganography. Steganalysis seeks to detect the presence of hidden messages in Works. Intuitively, Cachin's result states that the more similar the two probability distributions of the cover and stego Works are, the more difficult it is to distinguish between cover and stego Works ...
Ton Kalker   +4 more
openaire   +2 more sources

Steganalysis of Halftone Images

Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., 2006
We present a novel steganalysis technique for halftone images without knowledge of the original cover image. We first convert halftone images into grayscale-like images by low-pass filtering. The low-pass-filtered image is then decomposed using quadrature mirror filters, and a set of subband coefficients are generated at different scales and ...
Ming Jiang   +3 more
openaire   +2 more sources

Universal Batch Steganalysis [PDF]

open access: possible, 2014
Abstract : Steganography is the hiding of information within an innocent cover': such a technology is becoming increasingly desirable for those who wish to evade network monitoring or to disguise their circle of correspondents. On the other hand, it presents a challenge for those with a legitimate need to monitor networks. The aim of steganalysis is to
Tomas Pevny, Andrew D. Ker
openaire   +1 more source

Steganalysis of Compressed Speech

The Proceedings of the Multiconference on "Computational Engineering in Systems Applications", 2006
Based on the analyzing of the redundancy of coded parameters in G.723.1, a novel approach to detect hiding information is proposed in this paper. By using the statistical value of increaser entropy, this scheme can not only detect hidden messages embedded in compressed speech, but also estimate the embedded message length accurately .The experimental ...
Huang Yong-feng   +2 more
openaire   +2 more sources

Steganalysis

2002
Publisher Summary The field of steganalysis is concerned with simply identifying the existence of a message instead of actually extracting it. Steganography aims to conceal the existence of a message, not to scramble it. Many of the basic tests in steganalysis often just identify the possible existence of a message.
openaire   +3 more sources

Hardware Based Steganalysis

2008
Steganalysis is the reverse process of steganography. The goal of steganalysis is to detect, as reliably as possible, the presence of hidden data. Softwarebased steganolytic systems often fail to keep up with high-speed network throughputs. In this chapter, we present the design of a system that automatically detects steg-information in real-time.
Xuezeng Pan   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy