How do Statistical Detection Methods Compare to Entropy Measures Report Title
نویسندگان
چکیده
After the September 11, 2001 terrorist attack on the World Trade Center the United States declared war on terrorism. The Patriot Act (H.R. 3162) was passed, which authorizes law enforcement agencies to monitor and intercept the electronic communications of suspected terrorists. This meant that telephone communication and encrypted telephony would no longer be safe for terrorists to communicate with each other. This provoked them to search for alternate means to communicate sensitive information. The New York Times, USA Today, and the United States Institute of Peace have reported that terrorists may be using steganography and cryptography on the web as a means for convert communications [1, 22, 23]. These reports have been the basis of several studies into convert communication by terrorists. It is becoming increasingly important to detect the images that contain steganography such that we can reduce foul-play. This counter technique is known as steganalysis. There are two problems in steganalysis: (1) detecting the existence of a hidden message and (2) decoding the message. This research is only concerned with the first problem, which is the detection of hidden messages using statistical steganalysis Title: How do Statistical Detection Methods Compare to Entropy Measures. Jesús Vélez Torres IT Management & Information Assurance Dr. Alfredo Cruz Department of Electrical & Computer Engineering Polytechnic University of Puerto Rico
منابع مشابه
How well do practical information measures estimate the Shannon entropy?
Estimating the entropy of finite strings has applications in areas such as event detection, similarity measurement or in the performance assessment of compression algorithms. This report compares a variety of computable information measures for finite strings that may be used in entropy estimation. These include Shannon’s n-block entropy, the three variants of the Lempel-Ziv production complexi...
متن کاملFormally Assessing Cryptographic Entropy
Cryptography relies on the secrecy of keys. Measures of information, and thus secrecy, are called entropy. Previous work does not formally assess the cryptographically appropriate entropy of secret keys. This report defines several new forms of entropy appropriate for cryptographic situations. This report defines statistical inference methods appropriate for assessing cryptographic entropy.
متن کاملINFORMATION MEASURES BASED TOPSIS METHOD FOR MULTICRITERIA DECISION MAKING PROBLEM IN INTUITIONISTIC FUZZY ENVIRONMENT
In the fuzzy set theory, information measures play a paramount role in several areas such as decision making, pattern recognition etc. In this paper, similarity measure based on cosine function and entropy measures based on logarithmic function for IFSs are proposed. Comparisons of proposed similarity and entropy measures with the existing ones are listed. Numerical results limpidly betoken th...
متن کاملThe Entropy of Attention and Popularity in YouTube Videos
The vast majority of YouTube videos never become popular, languishing in obscurity with few views, no likes, and no comments. We use information theoretical measures based on entropy to examine how time series distributions of common measures of popularity in videos from YouTube’s “Trending videos” and “Most recent” video feeds relate to the theoretical concept of attention. While most of the v...
متن کامل