A survey of machine learning algorithms and their application in information security

M Stamp - Guide to vulnerability analysis for computer networks …, 2018 - Springer
A Survey of Machine Learning Algorithms and Their Application in Information Security |
SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal …

Resampling and the detection of LSB matching in color bitmaps

AD Ker - … , and watermarking of multimedia contents VII, 2005 - spiedigitallibrary.org
We consider the problem of detecting the presence of hidden data in colour bitmap images.
Like straightforward LSB Replacement, LSB Matching (which randomly increments or …

An improved dynamic discrete firefly algorithm for blind image steganalysis

RR Chhikara, P Sharma, L Singh - International Journal of Machine …, 2018 - Springer
This paper presents an improved firefly algorithm (DyFA) for feature selection that improves
the convergence rate and reduces computational complexity through dynamic adaptation in …

Cover selection steganography method based on similarity of image blocks

H Sajedi, M Jamzad - 2008 IEEE 8th International Conference …, 2008 - ieeexplore.ieee.org
An advantage of steganography, as opposed to other information hiding techniques, is that
the embedder can select a cover image that results in the least detectable stego image. In a …

Towards multi-class blind steganalyzer for JPEG images

T Pevný, J Fridrich - International Workshop on Digital Watermarking, 2005 - Springer
In this paper, we use the previously proposed calibrated DCT features [9] to construct a
Support Vector Machine classifier for JPEG images capable of recognizing which …

Benchmarking steganographic and steganalysis techniques

M Kharrazi, HT Sencar… - … , and Watermarking of …, 2005 - spiedigitallibrary.org
There have been a number of steganography embedding techniques proposed over the
past few years. In turn the development of these techniques have led to an increased …

Creating and detecting doctored and virtual images: Implications to the child pornography prevention act

H Farid - 2004 - digitalcommons.dartmouth.edu
Abstract The 1996 Child Pornography Prevention Act (CPPA) extended the existing federal
criminal laws against child pornography to include certain types of" virtual porn". In 2002, the …

Linguistic steganalysis based on meta features and immune mechanism

H Yang, X Cao - Chinese Journal of Electronics, 2010 - ieeexplore.ieee.org
Linguistic steganalysis depends on efficient detection features due to the diversity of syntax
and the polysemia of semantics in natural language processing. This paper presents a novel …

Feature selection method for color image steganalysis based on fuzzy neighborhood conditional entropy

J Xu, J Yang, Y Ma, K Qu, Y Kang - Applied Intelligence, 2022 - Springer
The color image steganalysis method creats many redundant features during feature
extraction, which reduces the classification accuracy. To reduce the dimensionality of color …

Feature reduction and payload location with WAM steganalysis

AD Ker, I Lubenko - Media forensics and security, 2009 - spiedigitallibrary.org
WAM steganalysis is a feature-based classifier for detecting LSB matching steganography,
presented in 2006 by Goljan et al. and demonstrated to be sensitive even to small payloads …