Steganalysis in high dimensions: Fusing classifiers built on random subspaces

J Kodovský, J Fridrich - Media watermarking, security, and …, 2011 - spiedigitallibrary.org
By working with high-dimensional representations of covers, modern steganographic
methods are capable of preserving a large number of complex dependencies among …

Temporal derivative-based spectrum and mel-cepstrum audio steganalysis

Q Liu, AH Sung, M Qiao - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
To improve a recently developed mel-cepstrum audio steganalysis method, we present in
this paper a method based on Fourier spectrum statistics and mel-cepstrum coefficients …

Steganalysis of content-adaptive steganography in spatial domain

J Fridrich, J Kodovský, V Holub, M Goljan - Information Hiding: 13th …, 2011 - Springer
Content-adaptive steganography constrains its embedding changes to those parts of covers
that are difficult to model, such as textured or noisy regions. When combined with advanced …

New channel selection rule for JPEG steganography

F Huang, J Huang, YQ Shi - IEEE Transactions on Information …, 2012 - ieeexplore.ieee.org
In this paper, we present a new channel selection rule for joint photographic experts group
(JPEG) steganography, which can be utilized to find the discrete cosine transform (DCT) …

A capacity result for batch steganography

AD Ker - IEEE Signal Processing Letters, 2007 - ieeexplore.ieee.org
The problems of batch steganography and pooled steganalysis, proposed in, generalize the
problems of hiding and detecting hidden data to multiple covers. It was conjectured that …

Markov process-based retrieval for encrypted JPEG images

H Cheng, X Zhang, J Yu, F Li - EURASIP Journal on Information Security, 2016 - Springer
This paper develops a retrieval scheme for encrypted JPEG images based on a Markov
process. In our scheme, the stream cipher and permutation encryption are combined to …

Detection of seam carving and localization of seam insertions in digital images

A Sarkar, L Nataraj, BS Manjunath - … of the 11th ACM workshop on …, 2009 - dl.acm.org
" Seam carving" is a recently introduced content aware image resizing algorithm. This
method can also be used for image tampering. In this paper, we explore techniques to detect …

Diversity-based cascade filters for JPEG steganalysis

G Feng, X Zhang, Y Ren, Z Qian… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Steganalysis is a technique for detecting the existence of secret information hidden in digital
media. In this paper, we propose a novel scheme for JPEG steganalysis. In this scheme, we …

Improved approaches with calibrated neighboring joint density to steganalysis and seam-carved forgery detection in JPEG images

Q Liu, Z Chen - ACM Transactions on Intelligent Systems and …, 2014 - dl.acm.org
Steganalysis and forgery detection in image forensics are generally investigated separately.
We have designed a method targeting the detection of both steganography and seam …

From blind to quantitative steganalysis

T Pevny, J Fridrich, AD Ker - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
A quantitative steganalyzer is an estimator of the number of embedding changes introduced
by a specific embedding operation. Since for most algorithms the number of embedding …