Computational Intelligence in Steganalysis Environment

نویسندگان

  • ROSHIDI DIN
  • AZMAN SAMSUDIN
چکیده

This paper presents gives a consolidated view of digital media steganalysis from the perspective of computational intelligence (CI). The environment of digital media steganalysis can be divided into three (3) domains which are image steganalysis, audio steganalysis, and video steganalysis. Three (3) major methods have also been identified in the computational intelligence based on these steganalysis domains which are bayesian, neural network, and genetic algorithm. Each of these methods has pros and cons. Therefore, it depends on the steganalyst to use and choose a suitable method based on their purposes and its environment. Key-Words: Steganalysis, Computational Intelligence, Image, Audio, Video

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent Steganalytic System: Application on Natural Language Environment

This paper presents a consolidated view of the computational intelligence used in the natural language steganalysis. In order to understand the human intelligence on natural language, four major computational intelligence methods have been identified. They are bayesian, fuzzy logic, neural network, and genetic algorithm. This paper also presents a measurement tool to measure the natural languag...

متن کامل

Feature Mining with Computational Intelligence and Its Applications in Image Steganalysis and Bioinformatics

(NMT) in 2002. He is a great mentor with broad and long view and continuous scientific passion. I truly appreciate his advice and guidance in my research and his generous support throughout my PhD study as well as his encouraging and affording me to attend the prestigious international academic conferences, and hence broaden my horizon and make me thriving. Without him, I could not have this op...

متن کامل

Active Steganalysis of Transform Domain Steganography Based on Sparse Component Analysis

This paper presents a new active steganalysis method to break the transform domain steganography. Most of steganalysis techniques focus on detecting the presence or absence of a secret message in a cover (passive steganalysis), but in some cases we need to extract or estimate a hidden message (active steganalysis). Despite the importance of estimating the message, little research has been condu...

متن کامل

IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613

Steganography is the ability of hiding the very occurrence of communiqué by embedding secret messages into innocent looking cover up documents, such as digital images. Recognition of steganography, evaluation of message length, and its extraction belong to the field of steganalysis, which is actually a route for perceiving Stegnography. Bacterial foraging optimization (BFO) is a optimization te...

متن کامل

Multicast Routing in Wireless Sensor Networks: A Distributed Reinforcement Learning Approach

Wireless Sensor Networks (WSNs) are consist of independent distributed sensors with storing, processing, sensing and communication capabilities to monitor physical or environmental conditions. There are number of challenges in WSNs because of limitation of battery power, communications, computation and storage space. In the recent years, computational intelligence approaches such as evolutionar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009