Results 181 to 190 of about 3,326 (205)
Some of the next articles are maybe not open access.
Steganography and Steganalysis
2006In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process that conceals data or information within other data or conceals the fact that a message is being sent.
Merrill Warkentin+2 more
openaire +1 more source
2011
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared based on critical parameters such as the hidden message detection probability, accuracy of the estimated hidden message length and secret key, and so forth.
Hafiz Malik+2 more
openaire +1 more source
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared based on critical parameters such as the hidden message detection probability, accuracy of the estimated hidden message length and secret key, and so forth.
Hafiz Malik+2 more
openaire +1 more source
An Ensemble of Classifiers Approach to Steganalysis
2010 20th International Conference on Pattern Recognition, 2010Most work on steganalysis, except a few exceptions, have primarily focused on providing features with high discrimination power without giving due consideration to issues concerning practical deployment of steganalysis methods. In this work, we focus on machine learning aspect of steganalyzer design and utilize a hierarchical ensemble of classifiers ...
DİRİK, AHMET EMİR+3 more
openaire +4 more sources
2004 International Conference on Image Processing, 2004. ICIP '04., 2005
In this paper, we consider a new method for performing steganalysis using a statistical model of the cover medium. Using model based methodology, examples of detecting secret message and estimating the secret message length of bit-streams embedded using JSteg-like steganography and quantization index modulation are proposed. This steganalysis technique
Xiaoyi Yu, Yunhong Wang, Tieniu Tan
openaire +2 more sources
In this paper, we consider a new method for performing steganalysis using a statistical model of the cover medium. Using model based methodology, examples of detecting secret message and estimating the secret message length of bit-streams embedded using JSteg-like steganography and quantization index modulation are proposed. This steganalysis technique
Xiaoyi Yu, Yunhong Wang, Tieniu Tan
openaire +2 more sources
2008
Publisher Summary This chapter focuses on steganalysis—ways to attack steganography. Steganalysis seeks to detect the presence of hidden messages in Works. Intuitively, Cachin's result states that the more similar the two probability distributions of the cover and stego Works are, the more difficult it is to distinguish between cover and stego Works ...
Ton Kalker+4 more
openaire +2 more sources
Publisher Summary This chapter focuses on steganalysis—ways to attack steganography. Steganalysis seeks to detect the presence of hidden messages in Works. Intuitively, Cachin's result states that the more similar the two probability distributions of the cover and stego Works are, the more difficult it is to distinguish between cover and stego Works ...
Ton Kalker+4 more
openaire +2 more sources
Steganalysis of Halftone Images
Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005., 2006We present a novel steganalysis technique for halftone images without knowledge of the original cover image. We first convert halftone images into grayscale-like images by low-pass filtering. The low-pass-filtered image is then decomposed using quadrature mirror filters, and a set of subband coefficients are generated at different scales and ...
Ming Jiang+3 more
openaire +2 more sources
Universal Batch Steganalysis [PDF]
Abstract : Steganography is the hiding of information within an innocent cover': such a technology is becoming increasingly desirable for those who wish to evade network monitoring or to disguise their circle of correspondents. On the other hand, it presents a challenge for those with a legitimate need to monitor networks. The aim of steganalysis is to
Tomas Pevny, Andrew D. Ker
openaire +1 more source
Steganalysis of Compressed Speech
The Proceedings of the Multiconference on "Computational Engineering in Systems Applications", 2006Based on the analyzing of the redundancy of coded parameters in G.723.1, a novel approach to detect hiding information is proposed in this paper. By using the statistical value of increaser entropy, this scheme can not only detect hidden messages embedded in compressed speech, but also estimate the embedded message length accurately .The experimental ...
Huang Yong-feng+2 more
openaire +2 more sources
2002
Publisher Summary The field of steganalysis is concerned with simply identifying the existence of a message instead of actually extracting it. Steganography aims to conceal the existence of a message, not to scramble it. Many of the basic tests in steganalysis often just identify the possible existence of a message.
openaire +3 more sources
Publisher Summary The field of steganalysis is concerned with simply identifying the existence of a message instead of actually extracting it. Steganography aims to conceal the existence of a message, not to scramble it. Many of the basic tests in steganalysis often just identify the possible existence of a message.
openaire +3 more sources
2008
Steganalysis is the reverse process of steganography. The goal of steganalysis is to detect, as reliably as possible, the presence of hidden data. Softwarebased steganolytic systems often fail to keep up with high-speed network throughputs. In this chapter, we present the design of a system that automatically detects steg-information in real-time.
Xuezeng Pan+3 more
openaire +2 more sources
Steganalysis is the reverse process of steganography. The goal of steganalysis is to detect, as reliably as possible, the presence of hidden data. Softwarebased steganolytic systems often fail to keep up with high-speed network throughputs. In this chapter, we present the design of a system that automatically detects steg-information in real-time.
Xuezeng Pan+3 more
openaire +2 more sources