Results 71 to 80 of about 3,326 (205)
<title>Steganalysis based on JPEG compatibility</title> [PDF]
Jessica Fridrich+2 more
openalex +1 more source
A Complexity Approach for Steganalysis
In this proposal for the Journ es Codes et St ganographie 2012, we define a new rigorous approach for steganalysis based on the complexity theory. It is similar to the definitions of security that can be found for hash functions, PRNG, and so on. We propose here a notion of \emph{secure hiding} and we give a first secure hiding scheme.
Bahi, Jacques M.+2 more
openaire +2 more sources
Steganalysis of quantization index modulation data hiding [PDF]
Kyle T. Sullivan+4 more
openalex +1 more source
New blind steganalysis and its implications [PDF]
Miroslav Goljan+2 more
openalex +1 more source
Steganalysis based on Markov Model of Thresholded Prediction-Error Image [PDF]
Dekun Zou, Yun Shi, Wei Su, Guorong Xuan
openalex +1 more source
Background European Union (EU) research on cybersecurity is actively developing more efficient digital steganalysis techniques aimed at uncovering hidden online illegal content in apparently legitimate multimedia files.
Alejandro Nicolás-Sánchez+1 more
doaj +1 more source
Steganalysis of binary images [PDF]
With an increasing use of digital binary images including text, graphic and halftone images in daily life, security of the digital binary images such as certificate, transcript, scanning hard copy to electronic copy etc. is a big concern. Such a concern makes data hiding in binary images an important and attractive research topic in recent years ...
openaire +3 more sources
Toward Hybrid Classical Deep Learning-Quantum Methods for Steganalysis
This paper explores the potential of the hybrid classical deep learning quantum in addressing contemporary information security challenges, including cyber-attack detection and prevention, botnet detection, IP-theft, hardware defect detection, and more ...
Rini Wisnu Wardhani+4 more
doaj +1 more source
Equivalence Analysis Among DIH, SPA, and RS Steganalysis Methods [PDF]
Xiangyang Luo, Chunfang Yang, Fenlin Liu
openalex +1 more source
Pooled Steganalysis via Model Discrepancy
Pooled steganalysis aims to discover the guilty actor(s) among multiple normal actor(s). Existing techniques mainly rely on the high-dimension and time-consuming features.
Jiang Yu, Jing Zhang, Fengyong Li
doaj +1 more source