Estimating the Generalization Performance of an SVM Efficiently
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
A new approach for JPEG resize and image splicing detection
MiFor '09 Proceedings of the First ACM workshop on Multimedia in forensics
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
IEEE Transactions on Information Forensics and Security
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
A method to detect JPEG-based double compression
ISNN'11 Proceedings of the 8th international conference on Advances in neural networks - Volume Part II
A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO)
IH'11 Proceedings of the 13th international conference on Information hiding
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis of content-adaptive steganography in spatial domain
IH'11 Proceedings of the 13th international conference on Information hiding
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
IH'04 Proceedings of the 6th international conference on Information Hiding
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
How realistic is photorealistic?
IEEE Transactions on Signal Processing
IEEE Transactions on Fuzzy Systems
Spread spectrum image steganography
IEEE Transactions on Image Processing
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
IEEE Transactions on Information Forensics and Security - Part 2
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Proceedings of the Twelfth International Workshop on Multimedia Data Mining
Hi-index | 0.00 |
Recently well-designed adaptive steganographic systems, including ±1 embedding in the DCT domain with optimized costs to achieve the minimal-distortion [8], have posed serious challenges to steganalyzers. Additionally, although the steganalysis of Yet Another Steganographic Scheme (YASS) was actively conducted, the detection of the YASS steganograms by a large B-block parameter has not been well explored. In this paper, we aim to detect the state-of-the-art adaptive steganographic system in DCT-embedding and to improve the steganalysis of YASS. To detect DCT-embedding based adaptive steganography, we design the features of differential neighboring joint density on the absolute array of DCT coefficients between the original JPEG images and the calibrated versions. To discriminate YASS steganograms from covers, the candidate blocks that are possibly used for embedding and the non-candidate block neighbors that are impossibly used for information hiding are identified first. The difference of the neighboring joint density between candidate blocks and the non-candidate neighbors is obtained. Support Vector Machine (SVM) and logistic regression classifiers are employed for classification. Experimental results show that our approach is very promising when detecting DCT-embedding based adaptive steganography. Compared to the steganalysis based on CC-PEV feature set, our method greatly improves the detection accuracy; the advantage is especially noticeable in the detection of the steganograms with low relative payload. In steganalysis of YASS, our approach is superior to a previous well-known steganalysis algorithm; our method remarkably improves the detection accuracy especially in the detection of the YASS steganograms that are produced with a large B-block size, which was not well addressed before.