Image and Video Compression for Multimedia Engineering
Image and Video Compression for Multimedia Engineering
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
IH'04 Proceedings of the 6th international conference on Information Hiding
Context-based entropy coding of block transform coefficients for image compression
IEEE Transactions on Image Processing
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Proceedings of the 10th ACM workshop on Multimedia and security
Novelty detection in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Generic Adoption of Spatial Steganalysis to Transformed Domain
Information Hiding
Benchmarking for Steganography
Information Hiding
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis Versus Splicing Detection
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Proceedings of the 11th ACM workshop on Multimedia and security
Detection of seam carving and localization of seam insertions in digital images
Proceedings of the 11th ACM workshop on Multimedia and security
Spectrum Steganalysis of WAV Audio Streams
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Multi-class Blind Steganalysis Based on Image Run-Length Analysis
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Camera-Model Identification Using Markovian Transition Probability Matrix
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Novel stream mining for audio steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
IEEE Transactions on Information Forensics and Security
A wavelet-based blind JPEG image steganalysis uing co-occurrence matrix
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
Steganalysis for JPEG images based on statistical features of stego and cover images
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Steganalysis for Markov feature of difference array in DCT domain
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 7
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
Steganography using Gibbs random fields
Proceedings of the 12th ACM workshop on Multimedia and security
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Steganalysis using partially ordered Markov models
IH'10 Proceedings of the 12th international conference on Information hiding
Obtaining higher rates for steganographic schemes while maintaining the same detectability
IH'10 Proceedings of the 12th international conference on Information hiding
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Blind quantitative steganalysis based on feature fusion and gradient boosting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Derivative-based audio steganalysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Multimedia Tools and Applications
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis of content-adaptive steganography in spatial domain
IH'11 Proceedings of the 13th international conference on Information hiding
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Markovian rake transform for digital image tampering detection
Transactions on data hiding and multimedia security VI
Binary image steganographic techniques classification based on multi-class steganalysis
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Novel blind video forgery detection using markov models on motion residue
ACIIDS'12 Proceedings of the 4th Asian conference on Intelligent Information and Database Systems - Volume Part III
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Proceedings of the Twelfth International Workshop on Multimedia Data Mining
New feature presentation of transition probability matrix for image tampering detection
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A Novel bayesian classifier with smaller eigenvalues reset by threshold based on given database
ICIAR'07 Proceedings of the 4th international conference on Image Analysis and Recognition
Markov-based image forensics for photographic copying from printed picture
Proceedings of the 20th ACM international conference on Multimedia
Information Sciences: an International Journal
Block-based image steganalysis: Algorithm and performance evaluation
Journal of Visual Communication and Image Representation
A novel mapping scheme for steganalysis
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Robust median filtering detection based on filtered residual
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Theoretical Computer Science
A patch analysis method to detect seam carved images
Pattern Recognition Letters
Hi-index | 0.00 |
In this paper, a novel steganalysis scheme is presented to effectively detect the advanced JPEG steganography. For this purpose, we first choose to work on JPEG 2-D arrays formed from the magnitudes of quantized block DCT coefficients. Difference JPEG 2-D arrays along horizontal, vertical, and diagonal directions are then used to enhance changes caused by JPEG steganography. Markov process is applied to modeling these difference JPEG 2-D arrays so as to utilize the second order statistics for steganalysis. In addition to the utilization of difference JPEG 2-D arrays, a thresholding technique is developed to greatly reduce the dimensionality of transition probability matrices, i.e., the dimensionality of feature vectors, thus making the computational complexity of the proposed scheme manageable. The experimental works are presented to demonstrate that the proposed scheme has outperformed the existing steganalyzers in attacking OutGuess, F5, and MB1.