Information-theoretic analysis of steganalysis in real images
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Review: A review on blind detection for image steganography
Signal Processing
Universal Steganalysis Using Multiwavelet Higher-Order Statistics and Support Vector Machines
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks, Part III
ISC '08 Proceedings of the 11th international conference on Information Security
Steganalysis by subtractive pixel adjacency matrix
Proceedings of the 11th ACM workshop on Multimedia and security
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
A high-capacity steganography scheme for JPEG2000 baseline system
IEEE Transactions on Image Processing
MPSteg-color: a new steganographic technique for color images
IH'07 Proceedings of the 9th international conference on Information hiding
Steganalysis of LSB matching exploiting high-dimensional correlations between pixel differences
ICNC'09 Proceedings of the 5th international conference on Natural computation
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
Simple algorithmic modifications for improving blind steganalysis performance
Proceedings of the 12th ACM workshop on Multimedia and security
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
Information Sciences: an International Journal
Passive steganalysis based on higher order image statistics of curvelet transform
International Journal of Automation and Computing
A review of the audio and video steganalysis algorithms
Proceedings of the 48th Annual Southeast Regional Conference
The influence of the image basis on modeling and steganalysis performance
IH'10 Proceedings of the 12th international conference on Information hiding
Derivative-based audio steganalysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Multimedia Tools and Applications
A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO)
IH'11 Proceedings of the 13th international conference on Information hiding
Pre-processing for adding noise steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
A new scheme for covert communication via 3G encoded speech
Computers and Electrical Engineering
A novel blind detector for additive noise steganography in JPEG decompressed images
Multimedia Tools and Applications
Hi-index | 0.00 |
Development of digital communications systems significantly extended possibility to perform covert communications (steganography). This recalls an emerging demand in highly efficient counter-measures, i.e. steganalysis methods. Modern steganography is presented by a broad spectrum of various data-hiding techniques. Therefore development of corresponding steganalysis methods is rather a complex problem and challenging task. Moreover, in many practical steganalysis tasks second Kerckhoff's principle is not applicable because of absence of information about the used steganography method. This motivates to use blind steganalysis, which can be applied to the certain techniques where one can specify at least statistics of the hidden data. This paper focuses on the class of supervised steganalysis techniques developed for the additive steganography, which can be described as y = f(x, s, K) = x + g(s, K), where stego image y is obtained from the cover image x by adding a low-amplitude cover image independent ((1 embedding also known as LSB matching) or cover image dependent (LSB embedding) stego signals that may be also depended on secret stego key K and the secret data s. The function g(.) represents the embedding rule.