A new paradigm for steganalysis via clustering

AD Ker, T Pevný - Media watermarking, security, and forensics …, 2011 - spiedigitallibrary.org
We propose a new paradigm for blind, universal, steganalysis in the case when multiple
actors transmit multiple objects, with guilty actors including some stego objects in their …

Weighted stego-image steganalysis for JPEG covers

R Böhme - International Workshop on Information Hiding, 2008 - Springer
This paper contains two new results for the quantitative detector of LSB replacement
steganography based on a weighted stego-image (WS). First, for spatial domain …

[PDF][PDF] Image steganography and steganalysis

P Bateman, HG Schaathun - … Of Computing, Faculty of Engineering and …, 2008 - Citeseer
Steganography is the art of hiding information within other information in such a way that it is
hard or even impossible to tell that it is there. There are many different carriers for …

Steganalysis of JSteg algorithm using hypothesis testing theory

T Qiao, F Retraint, R Cogranne, C Zitzmann - EURASIP Journal on …, 2015 - Springer
This paper investigates the statistical detection of JSteg steganography. The approach is
based on a statistical model of discrete cosine transformation (DCT) coefficients challenging …

[图书][B] Machine learning in image steganalysis

HG Schaathun - 2012 - Wiley Online Library
Books are conceived with pleasure and completed with pain. Sometimes the result is not
quite the book which was planned. This is also the case for this book. I have learnt a lot from …

JPEG steganography detection with Benford's Law

P Andriotis, G Oikonomou, T Tryfonas - Digital Investigation, 2013 - Elsevier
In this paper we present a novel approach to the problem of steganography detection in
JPEG images by applying a statistical attack. The method is based on the empirical …

New framework for using image contents in blind steganalysis systems

H Amirkhani, M Rahmati - Journal of Electronic Imaging, 2011 - spiedigitallibrary.org
Although current blind image steganalysis systems utilize a wide variety of features and
classifiers, a common shortcoming in all of them is that they almost have similar processes …

Generalised category attack—improving histogram-based attack on JPEG LSB embedding

K Lee, A Westfeld, S Lee - … Hiding: 9th International Workshop, IH 2007 …, 2007 - Springer
We present a generalised and improved version of the category attack on LSB
steganography in JPEG images with straddled embedding path. It detects more reliably low …

Information Security and Cryptography

U Maurer, M Abadi, R Anderson, M Bellare… - 2007 - Springer
Untitled Page 1 Page 2 Information Security and Cryptography Texts and Monographs
Series Editor Ueli Maurer Associate Editors Martin Abadi Ross Anderson Mihir Bellare …

Weaknesses of MB2

C Ullerich, A Westfeld - International Workshop on Digital Watermarking, 2007 - Springer
Abstract Model-based steganography is a promising approach for hidden communication in
JPEG images with high steganographic capacity and competitive security. In this paper we …