An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
A distributed detection framework for Steganalysis
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Hidden Markov models and steganalysis
Proceedings of the 2004 workshop on Multimedia and security
Audio Content-based Highlight Detection Using Adaptive Hidden Markov Model
ISDA '06 Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications - Volume 01
An Evaluation Scheme for Steganalysis-proof Ability of Steganographic Algorithms
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 02
A novel steganography method based on modifying quantized spectrum values of MPEG/audio layer III
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
The capability of image in hiding a secret message
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
SNPD '08 Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
A Novel Analysis Method of Information Hiding
CISP '08 Proceedings of the 2008 Congress on Image and Signal Processing, Vol. 5 - Volume 05
An improved steganalysis approach for breaking the F5 algorithm
WSEAS Transactions on Computers
Computational intelligence in steganalysis environment
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Intelligent steganalytic system: application on natural language environment
WSEAS Transactions on Systems and Control
Linguistic steganography using automatically generated paraphrases
HLT '10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures
Hi-index | 0.00 |
In this paper, we present a consolidated formulation of conditional states from the perspective of steganalysis approach. It has been identified that the conditional states used in steganalysis approach include hypothesis testing, gaussion distribution, hidden markov model and vector analysis space. The main objective of this paper is to find the best approach to fit in using mathematical formulation for steganalytic system based on these conditional states. It is found that there is a boundary of solution between the steganalytic system and analyzed message.