Universal Steganalysis Using Feature Selection Strategy for Higher Order Image Statistics
نویسندگان
چکیده
منابع مشابه
Feature selection using order statistics
One of the fundamental problems in statistical pattern recognition, particularly in face recognition and similar applications, is the intractably high number of dimensions used to represent the input data. Various dimensionality reduction techniques have been studied in recent literature. Many of these techniques, including Principle Component Analysis (PCA), can be divided into two parts: feat...
متن کاملImage Restoration using Higher Order Statistics
Most of the techniques for image restoration are based on some known degradation models. But in many situations it is difficult to accurately measure the degradation factors or noise type that is the real motivation behind the use of blind deconvolution technique for image restoration. Here the observed degraded image is restored without having any prior knowledge about the noise type. Most of ...
متن کاملOptimized Image Steganalysis through Feature Selection using MBEGA
Feature based steganalysis, an emerging branch in information forensics, aims at identifying the presence of a covert communication by employing the statistical features of the cover and stego image as clues/evidences. Due to the large volumes of security audit data as well as complex and dynamic properties of steganogram behaviours, optimizing the performance of steganalysers becomes an import...
متن کاملUniversal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Statistical steganalysis exploits these irregularities in order to provide the best...
متن کاملSurvey on Universal Image Steganalysis
Ooverwhelming growth in communication technology and usage of internet has greatly facilitated transfer of data. The threat of unauthorized data access is increasing along with it. Since last decade, too many data hiding methods have been proposed. Because of large number of redundant bits, image has become popular carrier for data hiding techniques. The advancement in image steganography has p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2010
ISSN: 0975-8887
DOI: 10.5120/404-600