A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Quantitative steganalysis of digital images: estimating the secret message length
2003
Multimedia Systems
The objective of steganalysis is to detect messages hidden in cover objects, such as digital images. ...
Using those principles, we show how to estimate the secret message length for the most common embedding archetypes, including the F5 and OutGuess algorithms for JPEG, EzStego algorithm with random straddling ...
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either express or implied, of Air Force Research Laboratory ...
doi:10.1007/s00530-003-0100-9
fatcat:bkekebd5uvambmbwkhghhzuqpa
A Steganographic Method for Digital Images Robust to RS Steganalysis
[chapter]
2005
Lecture Notes in Computer Science
For example, RS steganalysis is very efficient in detecting the presence of a message in a digital image and to estimate its approximate size. ...
The Least Significant Bit (LSB) encoding is one of the most widely used methods for embedding a message in a digital image. ...
When the estimated message length by RS steganalysis is below 5% (the typical range of accuracy of the method), the steganalysis fails to detect the presence of the secret message. ...
doi:10.1007/11559573_144
fatcat:45rialsd35cjjbyjqdgawsw7i4
Steganalysis of Degraded Document Images
2005
2005 IEEE 7th Workshop on Multimedia Signal Processing
In this paper, a steganalysis technique using compression bit rate as a distinguishing statistic is presented to detect secret messages embedded in document images that are degraded in quality by printing ...
Experimental results showed that the proposed technique can detect stego images wtih reasonably good accuracy, given the inherent difficulty of the problem. ...
Based on this approach, our goal is to identify a good distinguishing statistic of an image that predictably changes with the length of the embedded secret message, even in the presence of noise caused ...
doi:10.1109/mmsp.2005.248660
dblp:conf/mmsp/0006WMW05
fatcat:v6cnhydx3fcjxofzh5mzda2dey
Security Analysis on Spatial $\pm$1 Steganography for JPEG Decompressed Images
2011
IEEE Signal Processing Letters
Index Terms-JPEG images, LSB matching, LSB replacement, quantitative steganalysis. ...
about JPEG compression error analysis [1], and then we present a quantitative method to reliably estimate the length of spatial modifications in those gray-scale JPEG stegos by using data fitting technology ...
On the other side, steganalysis firstly tries to differentiate stego medias from covers, then further estimate the length of the secret message, and finally extract and decipher the secret message as the ...
doi:10.1109/lsp.2010.2091127
fatcat:mm45pr3enbfznht7meuccok6gi
Adaptive Matrix Pattern Steganography on RGB Images
2021
Journal of Cyber Security and Mobility
The AMP method increases the security of the steganography scheme of largely hidden messages since it adaptively generates a unique codebook matrix pattern for each ASCII character in each image block. ...
The resulting stego-images are robust against LSB blind attacks since the middle bits of green and blue channels generate matrix patterns and hiding secrets, respectively. ...
Holub for answering our emails and sharing scripts to transfer the RAW RGB images of the BOSSBase dataset to 512 × 512 RGB images. ...
doi:10.13052/jcsm2245-1439.1111
fatcat:vn2cqdetmjfanbzvje6od7wzpy
A Survey on Image Steganography and Steganalysis
2011
Journal of Information Hiding and Multimedia Signal Processing
This paper provides a survey on steganography and steganalysis for digital images, mainly covering the fundamental concepts, the progress of steganographic methods for images in spatial representation ...
Steganography refers to the technology of hiding data into digital media without drawing any suspicion, while steganalysis is the art of detecting the presence of steganography. ...
The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers. ...
dblp:journals/jihmsp/0011HH011
fatcat:x4h7oi5hijf4tojs6sfvlfzd6a
Weighted Stego-Image Steganalysis of Messages Hidden into Each Bit Plane
2011
Computer journal
For hiding messages into multiple least significant bit (MLSB) planes, a new weighted stego-image (WS) steganalysis method is proposed to estimate the ratio of messages hidden into each bit plane. ...
Block diagram of the proposed WS steganalysis for ID-MLSB steganography (In practice, the cover image will be replaced by an estimated cover image.). Downloaded from FIGURE 4. ...
Steganalysis that can estimate the length of the secret message or the modification ratio of the signal samples is called as quantitative steganalysis [5] . ...
doi:10.1093/comjnl/bxr112
fatcat:hurukf6vsnfudjueilf5jfciry
5-1 情報保護(Information Security)
5-1 Information Protection
2004
The Journal of the Institute of Image Electronics Engineers of Japan
5-1 Information Protection
Provos: " Defending against statistical steganalysis" , 10th USENIX Security Symposium, (200 1 ). 7 ) J.Fridrich,M.Goljan,D.Hogea,and D.Soukal: " Quantitative steganalysis of digital images: estimating ...
the secret message length" , ACM Multimedia Systems Journal,Vol.9, No.3, pp.28 8-30 2(2 003 ). 8 ) H. ...
doi:10.11371/iieej.33.931
fatcat:uzhoo7bncjhqrhd5sgjhsjjskm
A Robust Image Steganography Method Using Pmm In Bit Plane Domain
2015
Zenodo
The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. ...
In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. ...
In quantitative steganalysis the detector outputs not only a binary decision regarding weather the tested object is a stego object or not but also returns an estimate of the lengths of the secret message ...
doi:10.5281/zenodo.1337857
fatcat:xvqanc7wqrab7lcs3tijest4mu
Dwt Based Image Steganalysis
2014
Zenodo
The experiments are performed on a large set of pictures which are available freely in image database. The system also predicts the different message length definitions. ...
'Steganalysis' is one of the challenging and attractive interests for the researchers with the development of information hiding techniques. ...
Through this process an unknown image can be classified and predict the secret hidden message length. ...
doi:10.5281/zenodo.1096220
fatcat:e5vmwvkjazfsfb2k4f77uwkieq
Anti-forensic Approach to Remove StegoContent from Images and Videos
2019
Journal of Cyber Security and Mobility
By applying universal steganalysis we found that all images which have been subjected to our procedure have become stego free. ...
The application of generic image processing operations also causes degradation of cover image, which can also be restored using this anti forensic method. ...
They estimated the percentage of stego removed using BER. The recovered message was less than half the length of the bits embedded. But denoising degraded the image quality. ...
doi:10.13052/jcsm2245-1439.831
fatcat:tjclcuazszcajj24kdxyblgabi
Digital image steganography: Survey and analysis of current methods
2010
Signal Processing
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. ...
Steganalysis, which is the science of attacking steganography, is not the focus of this survey but nonetheless will be briefly discussed. ...
the image file, such as, the make and model of a camera, the time the picture was taken and digitized, the resolution of the image, exposure time, and the focal length. ...
doi:10.1016/j.sigpro.2009.08.010
fatcat:4kn2rpavfrdgrdgtfi7uv7f5ji
Prudently Secure Information Theoretic LSB Steganography for Digital Grayscale Images
2020
International Journal of Advanced Computer Science and Applications
a known-cover and known-message attack scenario. ...
Also, the recent legislative protection agreed to law enforcement authorities in Australia to sneak into pre-shared cryptographic secret keys (PSKs) shall have a devastating impact on the privacy of the ...
The author in [67] enhances the Weighted Stego-Image (WS) Steganalysis method evolved for LSB replacement payload size estimation in digital images. ...
doi:10.14569/ijacsa.2020.0110874
fatcat:36xmnfqzpjclrhi56xtwzi3ofa
A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis
2020
KSII Transactions on Internet and Information Systems
The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis. ...
Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques ...
Spatial Steganalysis Methods In spatial domain steganography the secret message is hide inside the image by applying some manipulation over different pixel values of the cover image, which effect the statistical ...
doi:10.3837/tiis.2020.03.017
fatcat:7ci7bfbjsfd2nn5yagnv2h3ora
Statistical steganalyis of images using open source software
2010
2010 IEEE Long Island Systems, Applications and Technology Conference
The main aim of our project was to design and implement a system able to classify the images into ones with no hidden message and steganographic images using classic pattern classification techniques such ...
We have also developed an application using Weka Java library for loading the data of the Images and classify the images into normal images and steganographic images. ...
With the wide availability of digital images, and the high degree of redundancy present in them despite compression, there has been an increased interest in using digital images as cover-objects for the ...
doi:10.1109/lisat.2010.5478333
fatcat:dmb3yrkrlfeqnnqizqe2xof64a
« Previous
Showing results 1 — 15 out of 119 results