measurements, for instance to face threats leveraging information hiding and
steganography. Unfortunately, this process could be time-consuming, lack of scalability and
cause performance degradations within computing and network nodes. Moreover, since the
detection of steganographic threats is poorly generalizable, being able to collect attack-
independent indicators is of prime importance. To this aim, the paper proposes to take …