Results 11 to 20 of about 3,326 (205)
Comprehensive Criteria-Based Generalized Steganalysis Feature Selection Method
Redundant steganalysis feature components in high-dimensional steganalysis feature of images increase the spatio-temporal complexity of steganalysis and even reduce the detection accuracy of the stego images.
Yihao Wang+4 more
doaj +1 more source
Steganalysis of transcoding steganography [PDF]
13 pages, 7 figures, 2 ...
Krzysztof Szczypiorski+2 more
openaire +2 more sources
Image steganalysis feature selection based on the improved Fisher criterion
In order to improve the detection accuracy of hidden message in images, steganalysis features are selected as inputs for steganalysers. However, the existing Fisher criterion ignores the contribution of steganalysis feature components in dispersion to ...
Yuanyuan Ma
doaj +1 more source
Extensible Steganalysis via Continual Learning
To realize secure communication, steganography is usually implemented by embedding secret information into an image selected from a natural image dataset, in which the fractal images have occupied a considerable proportion.
Zhili Zhou+3 more
doaj +1 more source
Neural Linguistic Steganalysis via Multi-Head Self-Attention
Linguistic steganalysis can indicate the existence of steganographic content in suspicious text carriers. Precise linguistic steganalysis on suspicious carrier is critical for multimedia security.
Sai-Mei Jiao+3 more
doaj +1 more source
Convolutional neural network-based methods are attracting increasing attention in steganalysis. However, steganalysis for content-adaptive image steganography in the spatial domain is still a difficult problem.
Zhili Xiang+5 more
doaj +1 more source
Steganalysis of Compressed Speech Based on Global and Local Correlation Mining
Most of the existing steganalysis methods are designed for specific steganography methods in low-bit-rate compressed speech stream and lack of generalization ability.
Jiawei Wang+3 more
doaj +1 more source
Hydan is a steganographic tool which can be used to hide any kind of information inside executable files. In this work, we present an efficient distinguisher for it: We have developed a system that is able to detect executable files with embedded information through Hydan.
Arturo Ribagorda+4 more
openaire +3 more sources
Adversarial subdomain adaptation network for mismatched steganalysis
Once data in the training and test sets come from different cover sources, that is, under the condition of cover source mismatch, it usually makes the detection accuracy rate of an outstanding steganalysis model to be reduced.In practical applications ...
Lei ZHANG, Hongxia WANG
doaj +3 more sources
Secure Cover Selection for Steganography
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis,
Zichi Wang, Xinpeng Zhang
doaj +1 more source