A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Neighboring joint density-based JPEG steganalysis
2011
ACM Transactions on Intelligent Systems and Technology
First, neighboring joint density features on both intra-block and inter-block are extracted from the DCT coefficient array and the absolute array, respectively; then a support vector machine (SVM) is applied ...
In this article, we propose a new approach based on feature mining on the discrete cosine transform (DCT) domain and machine learning for steganalysis of JPEG images. ...
CONCLUSIONS In this article, we present neighboring joint density-based JPEG steganalysis from the DCT coefficient array and the absolute DCT coefficient array, respectively. ...
doi:10.1145/1899412.1899420
fatcat:xwy5whrngbeu7mfibotr6ndp3m
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg Steganalysis
2012
International Journal of Soft Computing
The neighboring joint density on both intra-block and inter-block are extracted from the DCT coefficient array. ...
A novel approach based on feature mining on the discrete cosine transform (DCT) domain based approach, machine learning for steganalysis of JPEG images is proposed. ...
FEATURE BASED JPEG STEGANALYSIS USING NEIGHBORING JOINT DENSITY BASED FEATURES By combining the features obtained from the neighboring joint densities, a new feature based JPEG steganalysis scheme is proposed ...
doi:10.5121/ijsc.2012.3206
fatcat:7ivwpmhf3rbjjayhq3wrbh2mqa
Steganalysis of DCT-embedding based adaptive steganography and YASS
2011
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security - MM&Sec '11
To detect DCT-embedding based adaptive steganography, we design the features of differential neighboring joint density on the absolute array of DCT coefficients between the original JPEG images and the ...
The difference of the neighboring joint density between candidate blocks and the noncandidate neighbors is obtained. ...
Neighboring Joint Density based JPEG
Steganalysis We have shown that information-hiding in DCT domain generally modifies the neighboring joint density [26, 28] . ...
doi:10.1145/2037252.2037267
fatcat:brkttq4gkbgylnqjyukgqua444
Improved Approaches with Calibrated Neighboring Joint Density to Steganalysis and Seam-Carved Forgery Detection in JPEG Images
2014
ACM Transactions on Intelligent Systems and Technology
Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images. ...
By exploring the self-calibration under different shift recompressions, we propose calibrated neighboring joint density-based approaches with a simple feature set to distinguish steganograms and tampered ...
Neighboring Joint Density-Based JPEG Steganalysis In our previous work on a neighboring joint density-based approach to steganalysis of spatial domain-based steganographic system, the features were designed ...
doi:10.1145/2560365
fatcat:4mjvzbls6bcnjmqsd6mmhl5kmi
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
2012
Proceedings of the Twelfth International Workshop on Multimedia Data Mining - MDMKDD '12
To detect the contentaware-based forgery in JPEG images, in this paper, we merge shift-recompression-based characteristic features in spatial domain and shift-recompression-based neighboring joint density ...
We also transfer other popular JPEG-based steganalysis methods to detecting the forgery. ...
To detect such forgery, based on the recent advance in JPEG forgery detection and JPEG-based steganalysis, we design a calibrated neighboring joint density-based approach to detection of seam-carved forgery ...
doi:10.1145/2343862.2343864
fatcat:fjpal5u7cbbtrnftmvlwmxuxri
An improved approach to steganalysis of JPEG images
2010
Information Sciences
, F5, Steghide, and Model based steganography. ...
In this paper, a new scheme is proposed for steganalysis of JPEG images, which, being the most common image format, is believed to be widely used for steganography purposes as there are many free or commercial ...
[27] , Liu et al. expanded the approach for steganalysis of WAV audio streams using the features of the neighboring joint density and transition probability on the second order derivative [17] . ...
doi:10.1016/j.ins.2010.01.001
fatcat:avklkqeicvdktalaz46bqobxxy
A Review on Steganalysis Techniques: From Image Format Point of View
2014
International Journal of Computer Applications
This paper will review the image steganalysis techniques based on image type format classification, from image format point of view, focusing on the main and the most commonly used format JPEG, BMP, GIF ...
Many studies focus on review the steganalysis algorithm based on steganography and steganalysis classification. ...
Firstly, they calculate the joint probability density of each subband's difference from neighboring coefficients in the horizontal, vertical, and diagonal directions after two-level wavelet decomposition ...
doi:10.5120/17802-8617
fatcat:7qrsdifxvfdlzh6rqtdyjpxr34
Steganographer Identification
[article]
2019
arXiv
pre-print
To deal with the SIP, most of the state-of-the-arts use unsupervised learning based approaches. ...
Conventional steganalysis detects the presence of steganography within single objects. ...
Thus, Li et al. developed a 250-D features, by employing joint density matrices, for pooled JPEG steganalysis. ...
arXiv:1904.07554v1
fatcat:zmwhacbfkzh4hdgld4h6lgxt6q
Steganalysis for Markov Cover Data With Applications to Images
2006
IEEE Transactions on Information Forensics and Security
In particular, several effective image steganalysis techniques are based on the strong interpixel dependencies exhibited by natural images. ...
Thus, existing theoretical benchmarks based on independent and identically distributed (i.i.d.) models for the cover data underestimate attainable steganalysis performance and, hence, overestimate the ...
In addition to generating an empirical matrix based on adjacent pixels, we experimented with an empirical matrix generated from a pixel and an average of its four nearest neighbors. ...
doi:10.1109/tifs.2006.873595
fatcat:cqywze5hvjhftnqvc4ghmlxlta
Feature Mining and Neuro-Fuzzy Inference System for Steganalysis of LSB Matching Stegangoraphy in Grayscale Images
2007
International Joint Conference on Artificial Intelligence
In this paper, we present a scheme based on feature mining and neuro-fuzzy inference system for detecting LSB matching steganography in grayscale images, which is a very challenging problem in steganalysis ...
SVM-RFE and DENFIS based feature selection outperform statistical significance based feature selection such as t-test. ...
SVM-RFE and DENFIS-based feature selection outperform statistical significance based feature selection such as T-test in steganalysis. ...
dblp:conf/ijcai/LiuS07
fatcat:vco3un5cazex3a26dgk5wwt5nq
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis
2017
Journal of Information Security
This paper surveys various steganalysis methods, different filtering based preprocessing methods, feature extraction methods, and machine learning based classification methods, for the proper identification ...
A large number of steganalysis techniques are available for the detection of steganography in the image. ...
differential Discrete Cosine Transform (DCT) coefficients extracts the absolute values of the Neighboring Joint probability density (absNJ) features [21]. ...
doi:10.4236/jis.2017.83013
fatcat:3wvpxiaee5f3ne4ztn26zrzcwq
Block-based image steganalysis: Algorithm and performance evaluation
2013
Journal of Visual Communication and Image Representation
In this work, we differentiate a stego image from its cover image based on steganalysis of decomposed image blocks. ...
Keywords: Steganalysis Steganography Block-based image steganalysis Decision fusion Stego image Block decomposition Fisher linear discriminant classifier Dempster-Shafer theory a b s t r a c t Traditional ...
Under the assumption of independent block decisions, the conditional joint probability density Pðcjw k Þ can be written as the product of the marginal conditional probabilities as Pðcjw j Þ ¼ Pðc 1 ; . ...
doi:10.1016/j.jvcir.2013.05.007
fatcat:4alqn67fhzgitmzp4wyt2vqk3m
Uniform Embedding for Efficient JPEG Steganography
2014
IEEE Transactions on Information Forensics and Security
Compared with prior arts, the proposed scheme gains favorable performance in terms of secure embedding capacity against steganalysis. ...
In this paper, a class of new distortion functions known as uniform embedding distortion function (UED) is presented for both side-informed and non side-informed secure JPEG steganography. ...
By using the ensemble classifier [12] , the rich model based steganalysis can detect most existing JPEG steganographic algorithms with a high accuracy. ...
doi:10.1109/tifs.2014.2312817
fatcat:uuj2gcycdnfehcmqtylazbnmca
"A MultiAlgorithm, High Reliability, Extensible Steganalyzer using Services Oriented Architecture"
2011
International Journal of Computer Applications
The three steganalysis techniques used for feature extraction are binary similarity measures (BSM s), wavelet-based steganalysis (WBS) and feature-based steganalysis (FBS). ...
The analyzed four embedding techniques are: Outguess [16], F5 [17], M odel-Based [18] and perturbed quantization PQ [19]. The used cover media is jpeg images. ...
The neighboring joint density features on intrablocks are extracted. The details of the architectural components are given in [40] . ...
doi:10.5120/3297-4503
fatcat:xpfjl3smjrbrvjg6kzfittlcny
Improve Steganalysis by MWM Feature Selection
[chapter]
2012
Watermarking - Volume 2
Because the original images from BOSSbase are in the RAW format, we converse them into JPEG format with a 98 JPEG quality factor. ...
The intervals of the feature numbers are set differently because of the uneven density of the distribution of the MWM values. ...
Improve Steganalysis by MWM Feature Selection, Watermarking -Volume 2, Dr. ...
doi:10.5772/37988
fatcat:n3gzr3chjrfvzpafgugbx634o4
« Previous
Showing results 1 — 15 out of 53 results