188 Hits in 4.2 sec

A Survey on Digital Image Steganography

Jiaxin Wang, Mengxin Cheng, Peng Wu, Beijing Chen
2019 Journal of Information Hiding and Privacy Protection  
. : Data hiding in images with adaptive numbers of least significant bits based on the human visual system. Ahmad, J.; Rehman, N.  ...  This paper provides a literature review on digital image steganography. The existing steganography algorithms are classified into traditional algorithms and deep learning-based algorithms.  ...  Therefore, ensuring the security of information on the Internet has become one of the problems to be solved urgently [Gupta, Gupta and Singhal (2014) ].  ... 
doi:10.32604/jihpp.2019.07189 fatcat:6dnb6vpepjfhfkl45e46pkggha

SmartSearch steganalysis

Jeffrey A. Bloom, Rafael Alonso, Edward J. Delp III, Ping W. Wong
2003 Security and Watermarking of Multimedia Contents V  
To do this we monitor traffic on Internet backbones, identify and log HTTP requests, and use this information to guide our process.  ...  The typical approaches to searching the web for covert communications are often based on the concept of "crawling" the Web via a smart "spider."  ...  A statistical feature vector is extracted from the image and input to a linear classifier. The classifier must first be trained.  ... 
doi:10.1117/12.477325 dblp:conf/sswmc/BloomA03 fatcat:75ftx6qcbvb6va5lya7fseu47i

CIS-Net: A Novel CNN Model for Spatial Image Steganalysis via Cover Image Suppression [article]

Songtao Wu, Sheng-hua Zhong, Yan Liu, Mengyuan Liu
2019 arXiv   pre-print
Several deep CNN models have been proposed via incorporating domain knowledge of image steganography/steganalysis into the design of the network and achieve state of the art performance on standard database  ...  Image steganalysis is a special binary classification problem that aims to classify natural cover images and suspected stego images which are the results of embedding very weak secret message signals into  ...  Previous researches [11,18] been proposed via incorporating domain knowledge of image steganography/steganalysis into the  ... 
arXiv:1912.06540v1 fatcat:wiinc6uyo5hdldjicpmfwl6p6a

Evolutionary Algorithms and Efficient Data Analytics for Image Processing [article]

Farid Ghareh Mohammadi, Farzan Shenavarmasouleh, M. Hadi Amini, Hamid R. Arabnia
2020 arXiv   pre-print
Because there are numerous steganography algorithms, and since each one of them requires a different type of steganalysis, the steganalysis process is extremely challenging.  ...  Universal steganalysis extracts a large number of features to distinguish stego images from cover images.  ...  Further, Farahani et al [38] aimed to tackle unsupervised domain adaptation and worked on groups of the domain adaptation from different prospectus.  ... 
arXiv:1907.12914v3 fatcat:4hkszxaxznba5nycfbhawmwxia

DWT Feature based Blind Image Steganalysis using Neural Network Classifier

Manisha Saini, Rita Chhikara
2015 International Journal of Engineering Research and  
Neural network back propagation classifier has been used to classify images into stego images and clean images.  ...  The performance metrics are MSE (Mean square error) and classification accuracy for blind image steganalysis using two steganography algorithms outguess and nsF5.  ...  Various classifiers are present, neural network is one of the classifier.  ... 
doi:10.17577/ijertv4is040887 fatcat:572muuin4bdwhjouvifliuzi4u

A Review on Steganalysis Techniques: From Image Format Point of View

Sherif MBadr, Goada Ismaial, Ashgan H. Khalil
2014 International Journal of Computer Applications  
General Terms Cover image, stego image, steganography, Keywords Steganalysis, Multimedia documents, Image format, frequency domain steganalysis, spatial domain steganalysis.  ...  This paper will review the image steganalysis techniques based on image type format classification, from image format point of view, focusing on the main and the most commonly used format JPEG, BMP, GIF  ...  It is further classified as spatial domain steganalysis (Image Domain) and Transform domain steganalysis (Frequency Domain steganalysis).  ... 
doi:10.5120/17802-8617 fatcat:7qrsdifxvfdlzh6rqtdyjpxr34

Steganalysis of Quantization Index Modulation Steganography in G.723.1 Codec

Zhijun Wu, Rong Li, Panpan Yin, Changliang Li
2020 Future Internet  
The speech samples with different embedding rates and different durations were tested to verify their impact on the accuracy of the steganalysis.  ...  and studying the influence of adjacent index values in voice over internet protocol (VoIP).  ...  It was first used in image digital watermarking, and then gradually extended to image, speech steganography and steganalysis. In terms of transforming domain, Gao et al.  ... 
doi:10.3390/fi12010017 fatcat:po6av5kysfbthacrbvegzqmdnm

Fuzzy Localization of Steganographic Flipped Bits via Modification Map

Quanqi Liu, Tong Qiao, Ming Xu, Ning Zheng
2019 IEEE Access  
Adaptive steganography has become unprecedentedly prevalent compared with non-adaptive ones due to its remarkable performance when resisting modern steganalysis.  ...  By re-embedding randomly generated messages upon one single image, we observe that adaptive steganographic methods are prone to modify pixels in the same region, namely texture region.  ...  Current arts (see [5] , [15] , [16] ) classify between cover and stego images via rich models using ensemble learning.  ... 
doi:10.1109/access.2019.2920304 fatcat:2elqzk7wjzcijelmmynvhgqisu

Towards objectifying information hiding

Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt
2010 2010 IEEE International Conference on Acoustics, Speech and Signal Processing  
A neural network classifier was trained with features derived from 400 images. Comparisons with existing systems will also be highlighted.  ...  Although, any existing algorithm can benefit from this technique to enhance its performance against steganalysis attacks, however this work also considers a new embedding algorithm in the wavelet domain  ...  Spatial domain algorithms are prone to statistical attacks such as Chi-Square 2 [19] and 1 steganalysis [20] .  ... 
doi:10.1109/icassp.2010.5495434 dblp:conf/icassp/CheddadCCM10 fatcat:oheimkxwznhmbouacgled56qmi

Convolution Neural Networks for Blind Image Steganalysis: A Comprehensive Study

Hanaa Mohsin Ahmed, Halah Hasan Mahmoud
2019 Journal of Al-Qadisiyah for Computer Science and Mathematics  
Long-standing and important problem in image steganalysis difficulties mainly lie in how to give high accuracy and low payload in stego or cover images for improving performance of the network.  ...  In this comprehensive study a variety of scenarios and efforts are surveyed since 2014 at yet, in order to provide a guide to further improve future researchers what CNN-based blind image steganalysis  ...  Among the various media types the digital images are mostly used for communication as they contain redundant bits and are most widely used on internet.  ... 
doi:10.29304/jqcm.2019.11.2.573 fatcat:rnwnn6q5lbc6xcoucqbmnhtyxm

Moving steganography and steganalysis from the laboratory into the real world

Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomáš Pevný
2013 Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13  
There has been an explosion of academic literature on steganography and steganalysis in the past two decades.  ...  This position paper sets out some of the important questions which have been left unanswered, as well as highlighting some that have already been addressed successfully, for steganography and steganalysis  ...  One might say that it is no different to binary steganalysis: simply train a classifier on multiple images.  ... 
doi:10.1145/2482513.2482965 dblp:conf/ih/KerBBCCFFP13 fatcat:pdf3gedtzre6vg33kkeu6nm3oq

Secure Data Transfer over Internet Using Image Steganography: Review

Dakhaz Mustafa Abdullah, Siddeeq Y. Ameen, Naaman Omar, Azar Abid Salih, Dindar Mikaeel Ahmed, Shakir Fattah Kak, Hajar Maseeh Yasin, Ibrahim Mahmood Ibrahim, Awder Mohammed Ahmed, Zryan Najat Rashid
2021 Asian Journal of Research in Computer Science  
Therefore, several researchers acquire an entire focus on secure transmitting secret information.  ...  According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain.  ...  Approaches for picture steganography have been classified as spatial domain and frequency domain techniques [17] .  ... 
doi:10.9734/ajrcos/2021/v10i330243 fatcat:pgi7epb54veqvaxkfnxpcece4m

Improving LSB steganalysis using marginal and joint probabilistic distributions

Benoit Roue, Patrick Bas, Jean-Marc Chassery
2004 Proceedings of the 2004 multimedia and security workshop on Multimedia and security - MM&Sec '04  
This paper is based on a previous LSB steganalysis scheme for digital images that estimates the size of the hidden message.  ...  and their uses, to improve steganalysis using segmentation, is proposed 1 .  ...  Nowadays with the appearance of numerical contents, like digital images or sharewares, steganography is more and more used via internet.  ... 
doi:10.1145/1022431.1022446 dblp:conf/mmsec/RoueBC04 fatcat:wkur73rrl5dpxgz6hjpfkhvlye

Introduction to the special issue on deep learning for real-time information hiding and forensics

Zhili Zhou, Ching-Nung Yang, Cheonshik Kim, Stelvio Cimato
2020 Journal of Real-Time Image Processing  
The paper entitled "Deep learning for real-time image steganalysis: a survey", co-authored by Ruan et al. [16] , gives a survey on real-time image steganalysis based on deep learning.  ...  Introduction With rapid development of network technologies and the wide use of digital camera devices, digital multimedia (in particular image and video data) has grown tremendously on the internet.  ... 
doi:10.1007/s11554-020-00947-2 fatcat:ge4olggcubhm3nouy4bkphezvu

StegoWall: blind statistical detection of hidden data

Sviatoslav V. Voloshynovskiy, Alexander Herrigel, Yuri B. Rytsar, Thierry Pun, Edward J. Delp III, Ping W. Wong
2002 Security and Watermarking of Multimedia Contents IV  
The basic idea of our complex approach is to exploit all information about hidden data statistics to perform its detection based on a stochastic framework.  ...  The StegoWall system will be used for four main applications: robust watermarking, secret communications, integrity control and tamper proofing, and Internet/Network security.  ...  via Internet (since some hidden data is detected); • the viruses that fool broadcast monitoring or Internet advertising systems based on protocol attacks that can copy a watermark labels in completely  ... 
doi:10.1117/12.465324 dblp:conf/sswmc/VoloshynovskiyH02 fatcat:6o2jvywucnhsrglikw4eez5m6q
« Previous Showing results 1 — 15 out of 188 results