Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)

Y Ren, S Cai, L Wang - Journal of Information Security and Applications, 2021 - Elsevier
Abstract Advanced Audio Coding (AAC) is currently the most widely used audio
compression standard in Internet applications. In this paper, a large capacity secure …

Improved detection and evaluation for JPEG steganalysis

Q Liu, AH Sung, M Qiao - Proceedings of the 17th ACM international …, 2009 - dl.acm.org
Detection of information-hiding in JPEG images is actively delivered in steganalysis
community due to the fact that JPEG is a widely used compression standard and several …

Novel stream mining for audio steganalysis

Q Liu, AH Sung, M Qiao - Proceedings of the 17th ACM international …, 2009 - dl.acm.org
In this paper, we present a novel stream data mining for audio steganalysis, based on
second order derivative of audio streams. We extract Mel-cepstrum coefficients and Markov …

Binary image steganographic techniques classification based on multi-class steganalysis

KL Chiew, J Pieprzyk - Information Security, Practice and Experience: 6th …, 2010 - Springer
In this paper, we propose a new multi-class steganalysis for binary image. The proposed
method can identify the type of steganographic technique used by examining on the given …

[PDF][PDF] Image-splicing forgery detection based on improved lbp and k-nearest neighbors algorithm

F Hakimi, I Zanjan, I Hariri - Electronics Information & Planning, 2015 - researchgate.net
The wide use of high-performance image acquisition devices and powerful image-
processing software has made it easy to tamper images for malicious purposes. Image …

Forensics aided steganalysis of heterogeneous images

M Barni, G Cancelli, A Esposito - 2010 IEEE international …, 2010 - ieeexplore.ieee.org
We tackle the problem of the steganalysis of images produced by different sources. We first
use a classifier to try to understand the image source and then use a version of the …

Going from small to large data in steganalysis

I Lubenko, AD Ker - Media Watermarking, Security, and …, 2012 - spiedigitallibrary.org
With most image steganalysis traditionally based on supervised machine learning methods,
the size of training data has remained static at up to 20000 training examples. This …

Influence of embedding strategies on security of steganographic methods in the JPEG domain

J Kodovský, J Fridrich - Security, Forensics, Steganography …, 2008 - spiedigitallibrary.org
In this paper, we study how specific design principles and elements of steganographic
schemes for the JPEG format influence their security. Our goal is to shed some light on how …

On completeness of feature spaces in blind steganalysis

J Kodovský, J Fridrich - Proceedings of the 10th ACM Workshop on …, 2008 - dl.acm.org
Blind steganalyzers can be used for many diverse applications in steganography that go
well beyond a mere detection of stego content. A blind steganalyzer can also be used for …

From blind to quantitative steganalysis

T Pevny, J Fridrich, AD Ker - Media forensics and security, 2009 - spiedigitallibrary.org
Quantitative steganalyzers are important in forensic steganalysis as they can estimate the
payload, or, more precisely, the number of embedding changes in the stego image. This …