A Theory for Multiresolution Signal Decomposition: The Wavelet Representation
IEEE Transactions on Pattern Analysis and Machine Intelligence
IBM Systems Journal
Feature Selection: Evaluation, Application, and Small Sample Performance
IEEE Transactions on Pattern Analysis and Machine Intelligence
Communications of the ACM
Robust image watermarking in the spatial domain
Signal Processing
Neural Networks for Pattern Recognition
Neural Networks for Pattern Recognition
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Detecting Steganographic Messages in Digital Images
Detecting Steganographic Messages in Digital Images
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic Function
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume I - Volume 01
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
Data Embedding Into Pictorial Images with Less Distortion Using Descrete Cosine Transform
ICPR '96 Proceedings of the 13th International Conference on Pattern Recognition - Volume 2
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
LTSB steganalysis based on quartic equation
Transactions on data hiding and multimedia security II
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
LIBSVM: A library for support vector machines
ACM Transactions on Intelligent Systems and Technology (TIST)
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Towards multi-class blind steganalyzer for JPEG images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
An improved sample pairs method for detection of LSB embedding
IH'04 Proceedings of the 6th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Detection of LSB steganography via sample pair analysis
IEEE Transactions on Signal Processing
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Steganalysis of Embedding in Two Least-Significant Bits
IEEE Transactions on Information Forensics and Security
Optimized Feature Extraction for Learning-Based Image Steganalysis
IEEE Transactions on Information Forensics and Security
A feature-based classification technique for blind image steganalysis
IEEE Transactions on Multimedia
A new blind method for detecting novel steganography
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Spread spectrum image steganography
IEEE Transactions on Image Processing
Steganalysis using image quality metrics
IEEE Transactions on Image Processing
Is image steganography natural?
IEEE Transactions on Image Processing
IEEE Transactions on Information Forensics and Security
A wavelet-based blind JPEG image steganalysis uing co-occurrence matrix
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
An improved section-wise exploiting modification direction method
Signal Processing
An adaptive median filter algorithm based on B-spline function
International Journal of Automation and Computing
Image data hiding schemes based on graph coloring
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
An intelligent chaotic embedding approach to enhance stego-image quality
Information Sciences: an International Journal
Insider threats in corporate environments: a case study for data leakage prevention
Proceedings of the Fifth Balkan Conference in Informatics
Color local complexity estimation based steganographic (CLCES) method
Expert Systems with Applications: An International Journal
Active steganalysis for interpolation-error based reversible data hiding
Pattern Recognition Letters
Steganalysis of a PVD-based content adaptive image steganography
Signal Processing
Steganalysis of F5-like steganography based on selection of joint distribution features
Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service
Hi-index | 0.08 |
Blind steganalysis techniques detect the existence of secret messages embedded in digital media when the steganography embedding algorithm is unknown. This paper presents a survey of blind steganalysis methods for digital images. First, a principle framework is described for image blind steganalysis, which includes four parts: image pretreatment, feature extraction, classifier selection and design, and classification. We then classify the existing blind detection methods into two categories according to the development of feature extraction and classifier design. For the first category, we survey the principles of six kinds of typical feature extraction methods, describe briefly the algorithms of features extraction of these methods, and compare the performances of some typical feature extraction algorithms by employing the Bhattacharyya distance. For the second category, the development of classifier design, we make a survey on various classification algorithms used in existing blind detection methods, and detail the algorithms behind several classifiers based on multivariate regression analysis, OC-SVM, ANN, CIS and Hyper-geometric structure. Finally, some open problems in this field are discussed, and some interesting directions that may be worth researching in the future are indicated.