Results 71 to 80 of about 3,326 (205)

A Complexity Approach for Steganalysis

open access: yes, 2011
In this proposal for the Journ es Codes et St ganographie 2012, we define a new rigorous approach for steganalysis based on the complexity theory. It is similar to the definitions of security that can be found for hash functions, PRNG, and so on. We propose here a notion of \emph{secure hiding} and we give a first secure hiding scheme.
Bahi, Jacques M.   +2 more
openaire   +2 more sources

Steganalysis of quantization index modulation data hiding [PDF]

open access: green, 2005
Kyle T. Sullivan   +4 more
openalex   +1 more source

New blind steganalysis and its implications [PDF]

open access: green, 2006
Miroslav Goljan   +2 more
openalex   +1 more source

Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective

open access: yesCrime Science
Background European Union (EU) research on cybersecurity is actively developing more efficient digital steganalysis techniques aimed at uncovering hidden online illegal content in apparently legitimate multimedia files.
Alejandro Nicolás-Sánchez   +1 more
doaj   +1 more source

Steganalysis of binary images [PDF]

open access: yes, 2019
With an increasing use of digital binary images including text, graphic and halftone images in daily life, security of the digital binary images such as certificate, transcript, scanning hard copy to electronic copy etc. is a big concern. Such a concern makes data hiding in binary images an important and attractive research topic in recent years ...
openaire   +3 more sources

Toward Hybrid Classical Deep Learning-Quantum Methods for Steganalysis

open access: yesIEEE Access
This paper explores the potential of the hybrid classical deep learning quantum in addressing contemporary information security challenges, including cyber-attack detection and prevention, botnet detection, IP-theft, hardware defect detection, and more ...
Rini Wisnu Wardhani   +4 more
doaj   +1 more source

Pooled Steganalysis via Model Discrepancy

open access: yesMathematics
Pooled steganalysis aims to discover the guilty actor(s) among multiple normal actor(s). Existing techniques mainly rely on the high-dimension and time-consuming features.
Jiang Yu, Jing Zhang, Fengyong Li
doaj   +1 more source

Home - About - Disclaimer - Privacy