Filters








53 Hits in 3.7 sec

Neighboring joint density-based JPEG steganalysis

Qingzhong Liu, Andrew H. Sung, Mengyu Qiao
2011 ACM Transactions on Intelligent Systems and Technology  
First, neighboring joint density features on both intra-block and inter-block are extracted from the DCT coefficient array and the absolute array, respectively; then a support vector machine (SVM) is applied  ...  In this article, we propose a new approach based on feature mining on the discrete cosine transform (DCT) domain and machine learning for steganalysis of JPEG images.  ...  CONCLUSIONS In this article, we present neighboring joint density-based JPEG steganalysis from the DCT coefficient array and the absolute DCT coefficient array, respectively.  ... 
doi:10.1145/1899412.1899420 fatcat:xwy5whrngbeu7mfibotr6ndp3m

Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg Steganalysis

R Arun
2012 International Journal of Soft Computing  
The neighboring joint density on both intra-block and inter-block are extracted from the DCT coefficient array.  ...  A novel approach based on feature mining on the discrete cosine transform (DCT) domain based approach, machine learning for steganalysis of JPEG images is proposed.  ...  FEATURE BASED JPEG STEGANALYSIS USING NEIGHBORING JOINT DENSITY BASED FEATURES By combining the features obtained from the neighboring joint densities, a new feature based JPEG steganalysis scheme is proposed  ... 
doi:10.5121/ijsc.2012.3206 fatcat:7ivwpmhf3rbjjayhq3wrbh2mqa

Steganalysis of DCT-embedding based adaptive steganography and YASS

Qingzhong Liu
2011 Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security - MM&Sec '11  
To detect DCT-embedding based adaptive steganography, we design the features of differential neighboring joint density on the absolute array of DCT coefficients between the original JPEG images and the  ...  The difference of the neighboring joint density between candidate blocks and the noncandidate neighbors is obtained.  ...  Neighboring Joint Density based JPEG Steganalysis We have shown that information-hiding in DCT domain generally modifies the neighboring joint density [26, 28] .  ... 
doi:10.1145/2037252.2037267 fatcat:brkttq4gkbgylnqjyukgqua444

Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images

Qingzhong Liu, Zhongxue Chen
2014 ACM Transactions on Intelligent Systems and Technology  
Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images.  ...  By exploring the self-calibration under different shift recompressions, we propose calibrated neighboring joint density-based approaches with a simple feature set to distinguish steganograms and tampered  ...  Neighboring Joint Density-Based JPEG Steganalysis In our previous work on a neighboring joint density-based approach to steganalysis of spatial domain-based steganographic system, the features were designed  ... 
doi:10.1145/2560365 fatcat:4mjvzbls6bcnjmqsd6mmhl5kmi

Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images

Qingzhong Liu, Xiaodong Li, Peter A. Cooper, Xinfa Hu
2012 Proceedings of the Twelfth International Workshop on Multimedia Data Mining - MDMKDD '12  
To detect the contentaware-based forgery in JPEG images, in this paper, we merge shift-recompression-based characteristic features in spatial domain and shift-recompression-based neighboring joint density  ...  We also transfer other popular JPEG-based steganalysis methods to detecting the forgery.  ...  To detect such forgery, based on the recent advance in JPEG forgery detection and JPEG-based steganalysis, we design a calibrated neighboring joint density-based approach to detection of seam-carved forgery  ... 
doi:10.1145/2343862.2343864 fatcat:fjpal5u7cbbtrnftmvlwmxuxri

An improved approach to steganalysis of JPEG images

Qingzhong Liu, Andrew H. Sung, Mengyu Qiao, Zhongxue Chen, Bernardete Ribeiro
2010 Information Sciences  
, F5, Steghide, and Model based steganography.  ...  In this paper, a new scheme is proposed for steganalysis of JPEG images, which, being the most common image format, is believed to be widely used for steganography purposes as there are many free or commercial  ...  [27] , Liu et al. expanded the approach for steganalysis of WAV audio streams using the features of the neighboring joint density and transition probability on the second order derivative [17] .  ... 
doi:10.1016/j.ins.2010.01.001 fatcat:avklkqeicvdktalaz46bqobxxy

A Review on Steganalysis Techniques: From Image Format Point of View

Sherif MBadr, Goada Ismaial, Ashgan H. Khalil
2014 International Journal of Computer Applications  
This paper will review the image steganalysis techniques based on image type format classification, from image format point of view, focusing on the main and the most commonly used format JPEG, BMP, GIF  ...  Many studies focus on review the steganalysis algorithm based on steganography and steganalysis classification.  ...  Firstly, they calculate the joint probability density of each subband's difference from neighboring coefficients in the horizontal, vertical, and diagonal directions after two-level wavelet decomposition  ... 
doi:10.5120/17802-8617 fatcat:7qrsdifxvfdlzh6rqtdyjpxr34

Steganographer Identification [article]

Hanzhou Wu
2019 arXiv   pre-print
To deal with the SIP, most of the state-of-the-arts use unsupervised learning based approaches.  ...  Conventional steganalysis detects the presence of steganography within single objects.  ...  Thus, Li et al. developed a 250-D features, by employing joint density matrices, for pooled JPEG steganalysis.  ... 
arXiv:1904.07554v1 fatcat:zmwhacbfkzh4hdgld4h6lgxt6q

Steganalysis for Markov Cover Data With Applications to Images

K. Sullivan, U. Madhow, S. Chandrasekaran, B.S. Manjunath
2006 IEEE Transactions on Information Forensics and Security  
In particular, several effective image steganalysis techniques are based on the strong interpixel dependencies exhibited by natural images.  ...  Thus, existing theoretical benchmarks based on independent and identically distributed (i.i.d.) models for the cover data underestimate attainable steganalysis performance and, hence, overestimate the  ...  In addition to generating an empirical matrix based on adjacent pixels, we experimented with an empirical matrix generated from a pixel and an average of its four nearest neighbors.  ... 
doi:10.1109/tifs.2006.873595 fatcat:cqywze5hvjhftnqvc4ghmlxlta

Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images

Qingzhong Liu, Andrew H. Sung
2007 International Joint Conference on Artificial Intelligence  
In this paper, we present a scheme based on feature mining and neuro-fuzzy inference system for detecting LSB matching steganography in grayscale images, which is a very challenging problem in steganalysis  ...  SVM-RFE and DENFIS based feature selection outperform statistical significance based feature selection such as t-test.  ...  SVM-RFE and DENFIS-based feature selection outperform statistical significance based feature selection such as T-test in steganalysis.  ... 
dblp:conf/ijcai/LiuS07 fatcat:vco3un5cazex3a26dgk5wwt5nq

A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis

John Babu, Sridevi Rangu, Pradyusha Manogna
2017 Journal of Information Security  
This paper surveys various steganalysis methods, different filtering based preprocessing methods, feature extraction methods, and machine learning based classification methods, for the proper identification  ...  A large number of steganalysis techniques are available for the detection of steganography in the image.  ...  differential Discrete Cosine Transform (DCT) coefficients extracts the absolute values of the Neighboring Joint probability density (absNJ) features [21].  ... 
doi:10.4236/jis.2017.83013 fatcat:3wvpxiaee5f3ne4ztn26zrzcwq

Block-based image steganalysis: Algorithm and performance evaluation

Seongho Cho, Byung-Ho Cha, Martin Gawecki, C.-C. Jay Kuo
2013 Journal of Visual Communication and Image Representation  
In this work, we differentiate a stego image from its cover image based on steganalysis of decomposed image blocks.  ...  Keywords: Steganalysis Steganography Block-based image steganalysis Decision fusion Stego image Block decomposition Fisher linear discriminant classifier Dempster-Shafer theory a b s t r a c t Traditional  ...  Under the assumption of independent block decisions, the conditional joint probability density Pðcjw k Þ can be written as the product of the marginal conditional probabilities as Pðcjw j Þ ¼ Pðc 1 ; .  ... 
doi:10.1016/j.jvcir.2013.05.007 fatcat:4alqn67fhzgitmzp4wyt2vqk3m

Uniform Embedding for Efficient JPEG Steganography

Linjie Guo, Jiangqun Ni, Yun Qing Shi
2014 IEEE Transactions on Information Forensics and Security  
Compared with prior arts, the proposed scheme gains favorable performance in terms of secure embedding capacity against steganalysis.  ...  In this paper, a class of new distortion functions known as uniform embedding distortion function (UED) is presented for both side-informed and non side-informed secure JPEG steganography.  ...  By using the ensemble classifier [12] , the rich model based steganalysis can detect most existing JPEG steganographic algorithms with a high accuracy.  ... 
doi:10.1109/tifs.2014.2312817 fatcat:uuj2gcycdnfehcmqtylazbnmca

"A MultiAlgorithm, High Reliability, Extensible Steganalyzer using Services Oriented Architecture"

Eman Abdelfattah, Ausif Mahmood
2011 International Journal of Computer Applications  
The three steganalysis techniques used for feature extraction are binary similarity measures (BSM s), wavelet-based steganalysis (WBS) and feature-based steganalysis (FBS).  ...  The analyzed four embedding techniques are: Outguess [16], F5 [17], M odel-Based [18] and perturbed quantization PQ [19]. The used cover media is jpeg images.  ...  The neighboring joint density features on intrablocks are extracted. The details of the architectural components are given in [40] .  ... 
doi:10.5120/3297-4503 fatcat:xpfjl3smjrbrvjg6kzfittlcny

Improve Steganalysis by MWM Feature Selection [chapter]

B. B., X. F., D. G.
2012 Watermarking - Volume 2  
Because the original images from BOSSbase are in the RAW format, we converse them into JPEG format with a 98 JPEG quality factor.  ...  The intervals of the feature numbers are set differently because of the uneven density of the distribution of the MWM values.  ...  Improve Steganalysis by MWM Feature Selection, Watermarking -Volume 2, Dr.  ... 
doi:10.5772/37988 fatcat:n3gzr3chjrfvzpafgugbx634o4
« Previous Showing results 1 — 15 out of 53 results