Vision of the unseen: Current trends and challenges in digital image and video forensics

A Rocha, W Scheirer, T Boult… - ACM Computing Surveys …, 2011 - dl.acm.org
Digital images are everywhere—from our cell phones to the pages of our online news sites.
How we choose to use digital image processing raises a surprising host of legal and ethical …

Rich model for steganalysis of color images

M Goljan, J Fridrich, R Cogranne - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
In this paper, we propose an extension of the spatial rich model for steganalysis of color
images. The additional features are formed by three-dimensional co-occurrences of …

Data-hiding codes

P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …

Classification of steganalysis techniques: A study

A Nissar, AH Mir - Digital Signal Processing, 2010 - Elsevier
Steganography is the art of secret communication and steganalysis is the art of detecting the
hidden messages embedded in digital media using steganography. Both steganography …

New blind steganalysis and its implications

M Goljan, J Fridrich, T Holotyak - … , and Watermarking of …, 2006 - spiedigitallibrary.org
The contribution of this paper is two-fold. First, we describe an improved version of a blind
steganalysis method previously proposed by Holotyak et al. and compare it to current state …

A review on blind detection for image steganography

XY Luo, DS Wang, P Wang, FL Liu - Signal Processing, 2008 - Elsevier
Blind steganalysis techniques detect the existence of secret messages embedded in digital
media when the steganography embedding algorithm is unknown. This paper presents a …

Image steganography and steganalysis: Concepts and practice

M Kharrazi, HT Sencar, N Memon - Mathematics And Computation …, 2007 - World Scientific
In the last few years, we have seen many new and powerful steganography and
steganalysis techniques reported in the literature. In the following tutorial we go over some …

A general framework for structural steganalysis of LSB replacement

AD Ker - Information Hiding: 7th International Workshop, IH …, 2005 - Springer
There are many detectors for simple Least Significant Bit (LSB) steganography in digital
images, the most sensitive of which make use of structural or combinatorial properties of the …

Steganalysis for Markov cover data with applications to images

K Sullivan, U Madhow… - IEEE Transactions …, 2006 - ieeexplore.ieee.org
The difficult task of steganalysis, or the detection of the presence of hidden data, can be
greatly aided by exploiting the correlations inherent in typical host or cover signals. In …

[PDF][PDF] 以数字图像为载体的隐写分析研究进展

王朔中, 张新鹏, 张卫明[1 - 计算机学报, 2009 - cjc.ict.ac.cn
摘要隐写和反隐写的对抗是关系到信息安全的重要课题. 文中针对常用隐写载体之一即数字图像
, 回顾反隐写技术的最新进展. 根据隐写技术快速发展对反隐写研究提出的挑战 …