Results 11 to 20 of about 3,326 (205)

Comprehensive Criteria-Based Generalized Steganalysis Feature Selection Method

open access: yesIEEE Access, 2020
Redundant steganalysis feature components in high-dimensional steganalysis feature of images increase the spatio-temporal complexity of steganalysis and even reduce the detection accuracy of the stego images.
Yihao Wang   +4 more
doaj   +1 more source

Steganalysis of transcoding steganography [PDF]

open access: yesannals of telecommunications - annales des télécommunications, 2013
13 pages, 7 figures, 2 ...
Krzysztof Szczypiorski   +2 more
openaire   +2 more sources

Image steganalysis feature selection based on the improved Fisher criterion

open access: yesMathematical Biosciences and Engineering, 2020
In order to improve the detection accuracy of hidden message in images, steganalysis features are selected as inputs for steganalysers. However, the existing Fisher criterion ignores the contribution of steganalysis feature components in dispersion to ...
Yuanyuan Ma
doaj   +1 more source

Extensible Steganalysis via Continual Learning

open access: yesFractal and Fractional, 2022
To realize secure communication, steganography is usually implemented by embedding secret information into an image selected from a natural image dataset, in which the fractal images have occupied a considerable proportion.
Zhili Zhou   +3 more
doaj   +1 more source

Neural Linguistic Steganalysis via Multi-Head Self-Attention

open access: yesJournal of Electrical and Computer Engineering, 2021
Linguistic steganalysis can indicate the existence of steganographic content in suspicious text carriers. Precise linguistic steganalysis on suspicious carrier is critical for multimedia security.
Sai-Mei Jiao   +3 more
doaj   +1 more source

A New Convolutional Neural Network-Based Steganalysis Method for Content-Adaptive Image Steganography in the Spatial Domain

open access: yesIEEE Access, 2020
Convolutional neural network-based methods are attracting increasing attention in steganalysis. However, steganalysis for content-adaptive image steganography in the spatial domain is still a difficult problem.
Zhili Xiang   +5 more
doaj   +1 more source

Steganalysis of Compressed Speech Based on Global and Local Correlation Mining

open access: yesIEEE Access, 2022
Most of the existing steganalysis methods are designed for specific steganography methods in low-bit-rate compressed speech stream and lack of generalization ability.
Jiawei Wang   +3 more
doaj   +1 more source

Steganalysis of Hydan [PDF]

open access: yes, 2009
Hydan is a steganographic tool which can be used to hide any kind of information inside executable files. In this work, we present an efficient distinguisher for it: We have developed a system that is able to detect executable files with embedded information through Hydan.
Arturo Ribagorda   +4 more
openaire   +3 more sources

Adversarial subdomain adaptation network for mismatched steganalysis

open access: yes网络与信息安全学报, 2022
Once data in the training and test sets come from different cover sources, that is, under the condition of cover source mismatch, it usually makes the detection accuracy rate of an outstanding steganalysis model to be reduced.In practical applications ...
Lei ZHANG, Hongxia WANG
doaj   +3 more sources

Secure Cover Selection for Steganography

open access: yesIEEE Access, 2019
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis,
Zichi Wang, Xinpeng Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy