Results 21 to 30 of about 6,150 (193)

Steganography and Steganalysis in Voice over IP: A Review

open access: yesSensors, 2021
The rapid advance and popularization of VoIP (Voice over IP) has also brought security issues. VoIP-based secure voice communication has two sides: first, for legitimate users, the secret voice can be embedded in the carrier and transmitted safely in the
Zhijun Wu   +3 more
doaj   +1 more source

Steganalysis of Compressed Speech Based on Global and Local Correlation Mining

open access: yesIEEE Access, 2022
Most of the existing steganalysis methods are designed for specific steganography methods in low-bit-rate compressed speech stream and lack of generalization ability.
Jiawei Wang   +3 more
doaj   +1 more source

Cover-aware Steganalysis

open access: yesJournal of Cyber Security and Mobility, 2021
The increasing digitization offers new ways, possibilities and needs for a secure transmission of information. Steganography and its analysis constitute an essential part of IT-Security. In this work we show how methods of blind-steganalysis can be improved to work in cover-aware scenarios, we will call this non-blind steganalysis.
Niklas Bunzel   +2 more
openaire   +3 more sources

A New Convolutional Neural Network-Based Steganalysis Method for Content-Adaptive Image Steganography in the Spatial Domain

open access: yesIEEE Access, 2020
Convolutional neural network-based methods are attracting increasing attention in steganalysis. However, steganalysis for content-adaptive image steganography in the spatial domain is still a difficult problem.
Zhili Xiang   +5 more
doaj   +1 more source

Steganalysis of transcoding steganography [PDF]

open access: yesannals of telecommunications - annales des télécommunications, 2013
13 pages, 7 figures, 2 ...
Janicki, Artur   +2 more
openaire   +2 more sources

Adversarial subdomain adaptation network for mismatched steganalysis

open access: yes网络与信息安全学报, 2022
Once data in the training and test sets come from different cover sources, that is, under the condition of cover source mismatch, it usually makes the detection accuracy rate of an outstanding steganalysis model to be reduced.In practical applications ...
Lei ZHANG, Hongxia WANG
doaj   +3 more sources

Secure Cover Selection for Steganography

open access: yesIEEE Access, 2019
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis,
Zichi Wang, Xinpeng Zhang
doaj   +1 more source

Quantized Gaussian JPEG Steganography and Pool Steganalysis

open access: yesIEEE Access, 2022
Currently, algorithms for compressed image steganography mainly embed hidden message by minimizing the resulting distortion or statistical detectability.
Mohammed Aloraini   +2 more
doaj   +1 more source

Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2020
Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information.
Muh Hajar Akbar   +2 more
doaj   +1 more source

From Blind to Quantitative Steganalysis [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2009
A quantitative steganalyzer is an estimator of the number of embedding changes introduced by a specific embedding operation. Since for most algorithms the number of embedding changes correlates with the message length, quantitative steganalyzers are important forensic tools.
Pevný, T, Fridrich, J, Ker, A
openaire   +1 more source

Home - About - Disclaimer - Privacy