Results 191 to 200 of about 3,326 (205)
Some of the next articles are maybe not open access.
Passive Steganalysis Evaluation: Reliabilities of Modern Quantitative Steganalysis Algorithms
2016This paper presents initial results from experiments which perform statistically accurate evaluation of the reliability of modern quantitative statistical steganalysis algorithms. The focus here is on the algorithms for detection of simple LSB steganography in grayscale images. The following algorithms were evaluated: RS- analysis, Sample pair analysis,
A. G. Korobeynikov+4 more
openaire +2 more sources
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses a ideal background for those who wish to communicate covertly by the use of steganography.
Martin Steinebach+3 more
openaire +2 more sources
The rise of social networks during the last 10 years has created a situation in which up to 100 million new images and photographs are uploaded and shared by users every day. This environment poses a ideal background for those who wish to communicate covertly by the use of steganography.
Martin Steinebach+3 more
openaire +2 more sources
2011
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are used to measure detection accuracy, with different authors using incompatible benchmarks. Thus it is difficult to make a fair comparison of competing steganalysis methods.
openaire +1 more source
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are used to measure detection accuracy, with different authors using incompatible benchmarks. Thus it is difficult to make a fair comparison of competing steganalysis methods.
openaire +1 more source
Information Sciences, 2013
MP3, one of the most widely used digital audio formats, provides a high compression ratio with faithful quality. The widespread use enables MP3 audio files to become excellent covers to carry hidden information in audio steganography on the Internet.
Andrew H. Sung+2 more
openaire +2 more sources
MP3, one of the most widely used digital audio formats, provides a high compression ratio with faithful quality. The widespread use enables MP3 audio files to become excellent covers to carry hidden information in audio steganography on the Internet.
Andrew H. Sung+2 more
openaire +2 more sources
Statistical Steganalysis of Images
2019Steganalysis is the study of detecting secret information hidden in objects such as images, videos, texts, time series and games via steganography. Among those objects, the image is the most widely used object to hide secret messages. Detection of possible secret information hidden in images has attracted a lot of attention over the past ten years ...
openaire +2 more sources
Textural Features for Steganalysis
2013It is observed that the co-occurrence matrix, one kind of textural features proposed by Haralick et al., has played a very critical role in steganalysis. On the other hand, the data hidden in the image texture area has been known difficult to detect for years, and the modern steganographic schemes tend to embed data into complicated texture area where ...
Licong Chen+2 more
openaire +2 more sources
System approach to steganalysis
SPIE Proceedings, 2011Digital steganographic algorithms hide secret messages in seemingly innocent cover objects, such as images. Steganographic algorithms are rapidly evolving, reducing distortions, and making detection of altered cover objects by steganalysis algorithms more challenging.
Josef Allen+3 more
openaire +2 more sources
Steganalysis in computer forensics
20075th Australian Digital Forensics Conference, Edith Cowan University, Perth Western Australia, December 3rd 2007.
openaire +2 more sources
A Unified Steganalysis Framework
2013Abstract : Steganalysis research is mainly motivated to investigate the possible features that yields highest accuracy in identifying cover objects subjected to steganographic embedding. Although design of better steganalysis techniques is a crucial goal, given the diversity of steganography techniques and their ever-increasing sophistication, it is ...
openaire +2 more sources