M Goljan, J Fridrich - Media Watermarking, Security, and …, 2015 - spiedigitallibrary.org
Color interpolation is a form of upsampling, which introduces constraints on the relationship between neighboring pixels in a color image. These constraints can be utilized to …
M Kharrazi, HT Sencar… - Journal of Electronic …, 2006 - spiedigitallibrary.org
We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-known …
In this paper, we present a scheme based on feature mining and pattern classification to detect LSB matching steganography in grayscale images, which is a very challenging …
U Budhia, D Kundur, T Zourntos - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
In this paper, we present effective steganalysis techniques for digital video sequences based on interframe collusion that exploits the temporal statistical visibility of a hidden …
The information-hiding ratio is a well-known metric for evaluating steganalysis performance. In this paper, we introduce a new metric of image complexity to enhance the evaluation of …
T Pevny, J Fridrich - IEEE Transactions on Information …, 2008 - ieeexplore.ieee.org
The aim of this paper is to construct a practical forensic steganalysis tool for JPEG images that can properly analyze single-and double-compressed stego images and classify them to …
In this paper we study steganalysis, the detection of hidden data. Specifically we focus on detecting data hidden in grayscale images with spread spectrum hiding. To accomplish this …
We address the problem of detecting the presence of hidden messages in audio. The detector is based on the characteristics of the denoised residuals of the audio file, which …
M Stamp - Guide to vulnerability analysis for computer networks …, 2018 - Springer
A Survey of Machine Learning Algorithms and Their Application in Information Security | SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …