نتایج جستجو برای: steganalysis

تعداد نتایج: 823  

2011
Shen Wang Bian Yang Xiamu Niu

With the extensive application of steganography, it is challenged by steganalysis. The most notable steganalysis algorithm is the RS attack which detects the steg-message by the statistic analysis of pixel values. To ensure the security against the RS analysis, we presents a new steganography based on genetic algorithm in this paper. After embedding the secret message in LSB (least significant ...

2004
Mehmet Utku Celik Gaurav Sharma A. Murat Tekalp

The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego images that are perceptually identical to the cover images but exhibit statistical irregularities that distinguish them from cover images. Statistical steganalysis exploits these irregularities in order to provide the best...

So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a n...

Journal: :CoRR 2017
Hamzeh Ghasemzadeh

Comparing popularity of mp3 and wave with the amount of works published on each of them shows mp3 steganalysis has not found adequate attention. Furthermore, investigating existing works on mp3 steganalysis shows that a major factor has been overlooked. Experimenting with different mp3 encoders shows there are subtle differences in their outputs. This shows that mp3 standard has been implemente...

Journal: :IEEE Transactions on Information Forensics and Security 2010

2012
Tae Hee Park Il Kyu Eom

This paper presents an image steganalysis scheme based on interand intrascale wavelet subband correlations. The image is decomposed into eight pairs of interscale subbands and the joint characteristic function moments are extracted as features. Also we extract singular values from characteristic function moments of co-occurrence value for intrascale wavelet subbands in the same scale. Extracted...

Journal: :I. J. Network Security 2017
Jianjun Zhang Huajun Huang Lucai Wang HaiJun Lin Deng Gao

The attackers may discover the existence of the secret information or even get it by analyzing the cover’s statistical characteristics, changes of which often occur due to the embedding. In this paper, a novel coverless text information hiding method was proposed. By using the words rank map and the frequent words hash, normal texts containing the secret information could be retrieved from the ...

2014
James M. Whitaker

Steganalysis aims to detect the presence of hidden information, known as steganography, in digital images. Modern detectors rely on machine learning techniques, using features from digital images to classify them as covers or stegos. Often the ability to detect steganography can be improved through a process called calibration. Calibration attempts to establish a reference for cover features in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید