نتایج جستجو برای: steganalysis

تعداد نتایج: 823  

Journal: :JSW 2014
Fengying He Shangping Zhong Kaizhi Chen

Recently, ensemble learning algorithms are proposed to address the challenges of high dimensional classification for steganalysis caused by the curse of dimensionality and obtain superior performance. In this paper, we extend the state-of-the-art steganalysis tool developed by Kodovsky and Fridrich: the Kodovsky’s ensemble classifier and propose a novel method, called CSRS for high-dimensional ...

2011
Mahendra Kumar Richard Newman

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...

2004
Andrew D. Ker

We give initial results from a new project which performs statistically accurate evaluation of the reliability of image steganalysis algorithms. The focus here is on the Pairs and RS methods, for detection of simple LSB steganography in grayscale bitmaps, due to Fridrich et al. Using libraries totalling around 30,000 images we have measured the performance of these methods and suggest changes w...

2012
Jesus Velez Torres Alfredo Cruz

After the September 11, 2001 terrorist attack on the World Trade Center the United States declared war on terrorism. The Patriot Act (H.R. 3162) was passed, which authorizes law enforcement agencies to monitor and intercept the electronic communications of suspected terrorists. This meant that telephone communication and encrypted telephony would no longer be safe for terrorists to communicate ...

2013
Nicolas Bodin

Steganography is the science of writing hidden messages. In this context, an individual attempts to communicate with an entity without arousing suspicious on the very existence of this communication. This science completes cryptography science (COMmunication SECurity – COMSEC) when invisibility in addition to security is required. This PhD work, which has been carried out under the guidance and...

2010
Natarajan Meghanathan Lopamudra Nayak

Recently, there has been a lot of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover (carrier) media to obtain the stego media, in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media ...

Journal: :CoRR 2018
Xintao Duan Haoxian Song

A new coverless image information hiding method based on generative model is proposed, we feed the secret image to the generative model database, and generate a meaning-normal and independent image different from the secret image, then, the generated image is transmitted to the receiver and is fed to the generative model database to generate another image visually the same as the secret image. ...

Journal: :CoRR 2008
Soumyendu Das Subhendu Das Bijoy Bandyopadhyay Sugata Sanyal

Steganography is the technique of hiding confidential information within any media. Steganography is often confused with cryptography because the two are similar in the way that they both are used to protect confidential information. The difference between the two is in the appearance in the processed output; the output of steganography operation is not apparently visible but in cryptography th...

2003
Shalin P. Trivedi Rajarathnam Chandramouli

Steganalysis of sequential steganography is presented in this paper. Abrupt change in statistics due to sequential embedding is exploited by the proposed technique. Analytical derivations are presented for several cases along with experimental results. Experiments show that the proposed method can be used quite effectively to detect locations and length of messages embedded using spread spectru...

2008
Wojciech Mazurczyk Krzysztof Szczypiorski

The paper concerns available steganographic techniques that can be used for creating covert channels for VoIP (Voice over Internet Protocol) streams. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols’ fields and is known for IP, UDP or TCP protoc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید