Improved Boosting Algorithms Using Confidence-rated Predictions
Machine Learning - The Eleventh Annual Conference on computational Learning Theory
Digital watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
On Advances in Statistical Modeling of Natural Images
Journal of Mathematical Imaging and Vision
An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detection of LSB Steganography via Sample Pair Analysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Kernel Methods for Pattern Analysis
Kernel Methods for Pattern Analysis
JPEG Compression Immune Steganography Using Wavelet Transform
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 02
Image Analysis, Random Fields and Markov Chain Monte Carlo Methods: A Mathematical Introduction (Stochastic Modelling and Applied Probability)
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
How realistic is photorealistic?
IEEE Transactions on Signal Processing
Analysis of multiresolution image denoising schemes using generalized Gaussian and complexity priors
IEEE Transactions on Information Theory
Statistical texture characterization from discrete wavelet representations
IEEE Transactions on Image Processing
Spread spectrum image steganography
IEEE Transactions on Image Processing
Steganalysis using image quality metrics
IEEE Transactions on Image Processing
IEEE Transactions on Circuits and Systems for Video Technology
The upper and lower bounds of the information-hiding capacity of digital images
Information Sciences: an International Journal
Adaptive embedding techniques for VQ-compressed images
Information Sciences: an International Journal
Spectrum Steganalysis of WAV Audio Streams
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
A new approach for JPEG resize and image splicing detection
MiFor '09 Proceedings of the First ACM workshop on Multimedia in forensics
Novel stream mining for audio steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis
IEEE Transactions on Information Forensics and Security
Tongue shape classification by geometric features
Information Sciences: an International Journal
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Near-optimal solution to pair-wise LSB matching via an immune programming strategy
Information Sciences: an International Journal
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
Information Sciences: an International Journal
Estimating watermarking capacity in gray scale images based on image complexity
EURASIP Journal on Advances in Signal Processing
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
Information Sciences: an International Journal
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Derivative-based audio steganalysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A method to detect JPEG-based double compression
ISNN'11 Proceedings of the 8th international conference on Advances in neural networks - Volume Part II
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
Watermarking and authentication of quantum images based on restricted geometric transformations
Information Sciences: an International Journal
Information Sciences: an International Journal
Information Sciences: an International Journal
A two-tier scheme for greyscale quantum image watermarking and recovery
International Journal of Innovative Computing and Applications
Hi-index | 0.07 |
The information-hiding ratio is a well-known metric for evaluating steganalysis performance. In this paper, we introduce a new metric of image complexity to enhance the evaluation of steganalysis performance. In addition, we also present a scheme of steganalysis of least significant bit (LSB) matching steganography, based on feature mining and pattern recognition techniques. Compared to other well-known methods of steganalysis of LSB matching steganography, our method performs the best. Results also indicate that the significance of features and the detection performance depend not only on the information-hiding ratio, but also on the image complexity.