One-class classification: taxonomy of study and review of techniques

SS Khan, MG Madden - The Knowledge Engineering Review, 2014 - cambridge.org
One-class classification (OCC) algorithms aim to build classification models when the
negative class is either absent, poorly sampled or not well defined. This unique situation …

A review of image steganalysis techniques for digital forensics

K Karampidis, E Kavallieratou… - Journal of information …, 2018 - Elsevier
Steganalysis and steganography are the two different sides of the same coin.
Steganography tries to hide messages in plain sight while steganalysis tries to detect their …

Deep residual learning for image steganalysis

S Wu, S Zhong, Y Liu - Multimedia tools and applications, 2018 - Springer
Image steganalysis is to discriminate innocent images and those suspected images with
hidden messages. This task is very challenging for modern adaptive steganography, since …

A secure IoT-based modern healthcare system with fault-tolerant decision making process

P Gope, Y Gheraibia, S Kabir… - IEEE Journal of …, 2020 - ieeexplore.ieee.org
The advent of Internet of Things (IoT) has escalated the information sharing among various
smart devices by many folds, irrespective of their geographical locations. Recently …

Towards improving the performance of blind image steganalyzer using third-order SPAM features and ensemble classifier

J Hemalatha, M Sekar, C Kumar, A Gutub… - Journal of Information …, 2023 - Elsevier
The success rate for blind or universal steganalysis lies in the ability to extract the statistical
footprints of image features. Further, the choice of machine learning (ML) algorithm is crucial …

Steganalysis of LSB matching in grayscale images

AD Ker - IEEE signal processing letters, 2005 - ieeexplore.ieee.org
We consider the problem of detecting spatial domain least significant bit (LSB) matching
steganography in grayscale images, which has proved much harder than for its counterpart …

Merging Markov and DCT features for multi-class JPEG steganalysis

T Pevny, J Fridrich - Security, steganography, and …, 2007 - spiedigitallibrary.org
Blind steganalysis based on classifying feature vectors derived from images is becoming
increasingly more powerful. For steganalysis of JPEG images, features derived directly in …

Statistically undetectable jpeg steganography: dead ends challenges, and opportunities

J Fridrich, T Pevný, J Kodovský - Proceedings of the 9th workshop on …, 2007 - dl.acm.org
The goal of this paper is to determine the steganographic capacity of JPEG images (the
largest payload that can be undetectably embedded) with respect to current best …

Steganalysis using higher-order image statistics

S Lyu, H Farid - IEEE transactions on Information Forensics …, 2006 - ieeexplore.ieee.org
Techniques for information hiding (steganography) are becoming increasingly more
sophisticated and widespread. With high-resolution digital images as carriers, detecting …

How realistic is photorealistic?

S Lyu, H Farid - IEEE Transactions on Signal Processing, 2005 - ieeexplore.ieee.org
Computer graphics rendering software is capable of generating highly photorealistic images
that can be impossible to differentiate from photographic images. As a result, the unique …