期刊文献+
共找到59篇文章
< 1 2 3 >
每页显示 20 50 100
Image Steganalysis Based on an Adaptive Attention Mechanism and Lightweight DenseNet
1
作者 Zhenxiang He Rulin Wu Xinyuan Wang 《Computers, Materials & Continua》 2025年第10期1631-1651,共21页
With the continuous advancement of steganographic techniques,the task of image steganalysis has become increasingly challenging,posing significant obstacles to the fields of information security and digital forensics.... With the continuous advancement of steganographic techniques,the task of image steganalysis has become increasingly challenging,posing significant obstacles to the fields of information security and digital forensics.Although existing deep learning methods have achieved certain progress in steganography detection,they still encounter several difficulties in real-world applications.Specifically,current methods often struggle to accurately focus on steganography sensitive regions,leading to limited detection accuracy.Moreover,feature information is frequently lost during transmission,which further reduces the model’s generalization ability.These issues not only compromise the reliability of steganography detection but also hinder its applicability in complex scenarios.To address these challenges,this paper proposes a novel deep image steganalysis network designed to enhance detection accuracy and improve the retention of steganographic information through multilevel feature optimization and global perceptual modeling.The network consists of three core modules:the preprocessing module,the feature extraction module,and the classification module.In the preprocessing stage,a Spatial Rich Model(SRM)filter is introduced to extract the high-frequency residual information of the image to initially enhance the steganographic features;at the same time,a lightweight Densely Connected Convolutional Networks(DenseNet)structure is proposed to enhance the effective transmission and retention of the features and alleviate the information loss problem in the deep network.In the feature extraction stage,a hybrid modeling structure combining depth-separated convolution and ordinary convolution is constructed to improve the feature extraction efficiency and feature description capability;in addition,a dual-domain adaptive attention mechanism integrating channel and spatial dimensions is designed to dynamically allocate feature weights to achieve precise focusing on the steganography-sensitive region.Finally,the classification module adopts dual fully connected layers to realize the effective differentiation between coverage and steganography maps.These innovative designs not only effectively improve the accuracy and generalization ability of steganography detection,but also provide a new efficient network structure for the field of steganalysis.Numerous experimental results show that the detection performance of the proposed method outperforms the existing mainstream methods,such as SR-Net,TSNet,and CVTStego-Net,on the publicly available dataset BOSSbase and BOSW2.Meanwhile,multiple ablation experiments further validate the validity and reasonableness of the proposed network structure.These results not only promote the development of steganalysis technology but also provide more reliable detection tools for the fields of information security and digital forensics. 展开更多
关键词 Image steganalysis lightweight densenet adaptive attention feature focusing information retention
在线阅读 下载PDF
A SVM Based Text Steganalysis Algorithm for Spacing Coding 被引量:2
2
作者 YANG Yu 《China Communications》 SCIE CSCD 2014年第A01期108-113,共6页
Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ... Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%. 展开更多
关键词 text steganalysis SVM steganalysis space-coding detecting
在线阅读 下载PDF
A Novel Universal Steganalysis Algorithm Based on the IQM and the SRM 被引量:1
3
作者 Yu Yang Yuwei Chen +1 位作者 Yuling Chen Wei Bi 《Computers, Materials & Continua》 SCIE EI 2018年第8期261-272,共12页
The state-of-the-art universal steganalysis method,spatial rich model(SRM),and the steganalysis method using image quality metrics(IQM)are both based on image residuals,while they use 34671 and 10 features respectivel... The state-of-the-art universal steganalysis method,spatial rich model(SRM),and the steganalysis method using image quality metrics(IQM)are both based on image residuals,while they use 34671 and 10 features respectively.This paper proposes a novel steganalysis scheme that combines their advantages in two ways.First,filters used in the IQM are designed according to the models of the SRM owning to their strong abilities for detecting the content adaptive steganographic methods.In addition,a total variant(TV)filter is also used due to its good performance of preserving image edge properties during filtering.Second,due to each type of these filters having own advantages,the multiple filters are used simultaneously and the features extracted from their outputs are combined together.The whole steganalysis procedure is removing steganographic noise using those filters,then measuring the distances between images and their filtered version with the image quality metrics,and last feeding these metrics as features to build a steganalyzer using either an ensemble classifier or a support vector machine.The scheme can work in two modes,the single filter mode using 9 features,and the multi-filter mode using 639 features.We compared the performance of the proposed method,the SRM and the maxSRMd2.The maxSRMd2 is the improved version of the SRM.The simulated results show that the proposed method that worked in the multi-filter mode was about 10%more accurate than the SRM and maxSRMd2 when the data were globally normalized,and had similar performance with the SRM and maxSRMd2 when the data were locally normalized. 展开更多
关键词 Image steganalysis IQM SRM total variation universal image steganalysis
在线阅读 下载PDF
Steganalysis Using Fractal Block Codes and AP Clustering in Grayscale Images 被引量:1
4
作者 Guang-Yu Kang Yu-Xin Su +2 位作者 Shi-Ze Guo Rui-Xu Guo Zhe-Ming Lu 《Journal of Electronic Science and Technology》 CAS 2011年第4期312-316,共5页
This paper presents a universal scheme (also called blind scheme) based on fractal compression and affinity propagation (AP) clustering to distinguish stego-images from cover grayscale images, which is a very chal... This paper presents a universal scheme (also called blind scheme) based on fractal compression and affinity propagation (AP) clustering to distinguish stego-images from cover grayscale images, which is a very challenging problem in steganalysis. Since fractal codes represent the "self-similarity" features of natural images, we adopt the statistical moment of fractal codes as the image features. We first build an image set to store the statistical features without hidden messages, of natural images with and and then apply the AP clustering technique to group this set. The experimental result shows that the proposed scheme performs better than Fridrich's traditional method. 展开更多
关键词 Affinity propagation clustering fractal compression steganalysis universal steganalysis.
在线阅读 下载PDF
A HEVC Video Steganalysis Algorithm Based on PU Partition Modes 被引量:3
5
作者 Zhonghao Li Laijing Meng +3 位作者 Shutong Xu Zhaohong Li Yunqing Shi Yuanchang Liang 《Computers, Materials & Continua》 SCIE EI 2019年第5期563-574,共12页
Steganalysis is a technique used for detecting the existence of secret information embedded into cover media such as images and videos.Currently,with the higher speed of the Internet,videos have become a kind of main ... Steganalysis is a technique used for detecting the existence of secret information embedded into cover media such as images and videos.Currently,with the higher speed of the Internet,videos have become a kind of main methods for transferring information.The latest video coding standard High Efficiency Video Coding(HEVC)shows better coding performance compared with the H.264/AVC standard published in the previous time.Therefore,since the HEVC was published,HEVC videos have been widely used as carriers of hidden information.In this paper,a steganalysis algorithm is proposed to detect the latest HEVC video steganography method which is based on the modification of Prediction Units(PU)partition modes.To detect the embedded data,All the PU partition modes are extracted from P pictures,and the probability of each PU partition mode in cover videos and stego videos is adopted as the classification feature.Furthermore,feature optimization is applied,that the 25-dimensional steganalysis feature has been reduced to the 3-dimensional feature.Then the Support Vector Machine(SVM)is used to identify stego videos.It is demonstrated in experimental results that the proposed steganalysis algorithm can effectively detect the stego videos,and much higher classification accuracy has been achieved compared with state-of-the-art work. 展开更多
关键词 Video steganalysis PU partition modes data hiding HEVC videos
在线阅读 下载PDF
MI-STEG:A Medical Image Steganalysis Framework Based on Ensemble Deep Learning 被引量:2
6
作者 Rukiye Karakis 《Computers, Materials & Continua》 SCIE EI 2023年第3期4649-4666,共18页
Medical image steganography aims to increase data security by concealing patient-personal information as well as diagnostic and therapeutic data in the spatial or frequency domain of radiological images.On the other h... Medical image steganography aims to increase data security by concealing patient-personal information as well as diagnostic and therapeutic data in the spatial or frequency domain of radiological images.On the other hand,the discipline of image steganalysis generally provides a classification based on whether an image has hidden data or not.Inspired by previous studies on image steganalysis,this study proposes a deep ensemble learning model for medical image steganalysis to detect malicious hidden data in medical images and develop medical image steganography methods aimed at securing personal information.With this purpose in mind,a dataset containing brain Magnetic Resonance(MR)images of healthy individuals and epileptic patients was built.Spatial Version of the Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Stego(HUGO),and Minimizing the Power of Optimal Detector(MIPOD)techniques used in spatial image steganalysis were adapted to the problem,and various payloads of confidential data were hidden in medical images.The architectures of medical image steganalysis networks were transferred separately from eleven Dense Convolutional Network(DenseNet),Residual Neural Network(ResNet),and Inception-based models.The steganalysis outputs of these networks were determined by assembling models separately for each spatial embedding method with different payload ratios.The study demonstrated the success of pre-trained ResNet,DenseNet,and Inception models in the cover-stego mismatch scenario for each hiding technique with different payloads.Due to the high detection accuracy achieved,the proposed model has the potential to lead to the development of novel medical image steganography algorithms that existing deep learning-based steganalysis methods cannot detect.The experiments and the evaluations clearly proved this attempt. 展开更多
关键词 Deep learning medical image steganography image steganalysis transfer learning ensemble learning
在线阅读 下载PDF
Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix 被引量:2
7
作者 Junjia Chen Wei Lu +4 位作者 Yuileong Yeung Yingjie Xue Xianjin Liu Cong Lin Yue Zhang 《Computers, Materials & Continua》 SCIE EI 2018年第5期201-211,共11页
In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security.In most state-of-the-art binary image steganographic s... In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information security.In most state-of-the-art binary image steganographic schemes,they always find out the flippable pixels to minimize the embedding distortions.For this reason,the stego images generated by the previous schemes maintain visual quality and it is hard for steganalyzer to capture the embedding trace in spacial domain.However,the distortion maps can be calculated for cover and stego images and the difference between them is significant.In this paper,a novel binary image steganalytic scheme is proposed,which is based on distortion level co-occurrence matrix.The proposed scheme first generates the corresponding distortion maps for cover and stego images.Then the co-occurrence matrix is constructed on the distortion level maps to represent the features of cover and stego images.Finally,support vector machine,based on the gaussian kernel,is used to classify the features.Compared with the prior steganalytic methods,experimental results demonstrate that the proposed scheme can effectively detect stego images. 展开更多
关键词 Binary image steganalysis informational security embedding distortion distortion level map co-occurrence matrix support vector machine.
在线阅读 下载PDF
Passive Steganalysis Based on Higher Order Image Statistics of Curvelet Transform 被引量:1
8
作者 S.Geetha Siva S.Sivatha Sindhu N.Kamaraj 《International Journal of Automation and computing》 EI 2010年第4期531-542,共12页
Steganographic techniques accomplish covert communication by embedding secret messages into innocuous digital images in ways that are imperceptible to the human eye. This paper presents a novel passive steganalysis st... Steganographic techniques accomplish covert communication by embedding secret messages into innocuous digital images in ways that are imperceptible to the human eye. This paper presents a novel passive steganalysis strategy in which the task is approached as a pattern classification problem. A critical part of the steganalyser design depends on the selection of informative features. This paper is aimed at proposing a novel attack with improved performance indices with the following implications: 1) employing higher order statistics from a curvelet sub-band image representation that offers better discrimination ability for detecting stego anomalies in images, as compared to other conventional wavelet transforms; 2) increasing the sensitivity and specificity of the system by the feature reduction phase; 3) realizing the system using an efficient classification engine, a neuro-C4.5 classifier, which provides better classification rate. An extensive experimental evaluation on a database containing 5600 clean and stego images shows that the proposed scheme is a state-of-the-art steganalyser that outperforms other previous steganalytic methods. 展开更多
关键词 Image steganalysis curvelet higher order statistics neuro-C4.5 classifier information forensics information security
在线阅读 下载PDF
Audio steganalysis based on“negative resonance phenomenon”caused by steganographic tools 被引量:1
9
作者 RU Xue-min ZHUANG Yue-ting WU Fei 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期577-583,共7页
Researching on the impact different steganographic software tools have audio statistical features,revealed the phe-nomenon that when messages are embedded in a WAV file by using a certain tool,the variation of statist... Researching on the impact different steganographic software tools have audio statistical features,revealed the phe-nomenon that when messages are embedded in a WAV file by using a certain tool,the variation of statistical features in the WAV file which already contains messages embedded by the same tool is abruptly smaller than those in which messages have not been embedded.We call it“negative resonance phenomenon”temporarily.With the phenomenon above and Support Vector Machines(SVMs),we can detect the existence of hidden messages,and also identify the tools used to hide them.As shown by the experi-mental results,the proposed method can be very effectively used to detect hidden messages embedded by Hide4PGP,Stegowav and S-Tools4. 展开更多
关键词 Audio steganalysis Linear prediction Support Vector Machine(SVM)
在线阅读 下载PDF
An Effective Steganalysis Algorithm for Histogram-Shifting Based Reversible Data Hiding 被引量:1
10
作者 Junxiang Wang Lin Huang +3 位作者 Ying Zhang Yonghong Zhu Jiangqun Ni Yunqing Shi 《Computers, Materials & Continua》 SCIE EI 2020年第7期325-344,共20页
To measure the security for hot searched reversible data hiding(RDH)technique,especially for the common-used histogram-shifting based RDH(denoted as HS-RDH),several steganalysis schemes are designed to detect whether ... To measure the security for hot searched reversible data hiding(RDH)technique,especially for the common-used histogram-shifting based RDH(denoted as HS-RDH),several steganalysis schemes are designed to detect whether some secret data has been hidden in a normal-looking image.However,conventional steganalysis schemes focused on the previous RDH algorithms,i.e.,some early spatial/pixel domain-based histogram-shifting(HS)schemes,which might cause great changes in statistical characteristics and thus be easy to be detected.For recent improved methods,such as some adaptive prediction error(PE)based embedding schemes,those conventional schemes might be invalid,since those adaptive embedding mechanism would effectively reduce the embedding trace and thus increase the difficulty of steganalysis.Therefore,a novel steganalysis method is proposed in this paper to detect recent adaptive RDH schemes and provide a more effective detection tool for RDH.The contributions of this paper could be summarized as follows.(1)By analyzing the characteristics for those adaptive HS-RDH,an effective“flat ground”based detection method is designed to fast identify whether the given image is used to hide secret data;(2)According to the empirical statistical model,double check mechanism is provided to improve the detection accuracy;(3)In addition,to further improve detection ability,some detailed information for secret data,i.e.,its content and embedding location are further estimated.Compared with conventional steganalysis methods,experimental results indicate that our proposed algorithm could achieve a better detection accuracy and meanwhile acquire more detailed information on secret data. 展开更多
关键词 Reversible data hiding steganalysis DETECTION histogram shifting
在线阅读 下载PDF
A BLIND AUDIO STEGANALYSIS BASED ON FEATURE FUSION 被引量:1
11
作者 Wei Yifang Guo Li Wang Yujie Wang Cuiping 《Journal of Electronics(China)》 2011年第3期265-276,共12页
In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cep... In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cepstrum coefficients, audio quality metrics and features on linear prediction residue are extracted separately. Then feature fusion is conducted. The performance of the proposed steganalysis is evaluated against 4 steganographic schemes: Direct Sequence Spread Spectrum (DSSS), Quantization Index Modulation (QIM), ECHO embedding (ECHO), and Least Significant Bit em-bedding (LSB). Experiment results show that the classifying performance of the proposed detector is much superior to the previous work. Even more exciting is that the proposed methodology could detect the four steganography, with 85%+ classification accuracy achieved in all the detections, which makes the proposed steganalysis methodology capable of being regarded as a blind steganalysis, and especially useful when the steganalyzer are without the knowledge of the steganographic scheme employed in data embedding. 展开更多
关键词 Feature fusion steganalysis Mel-cepstrum Second-order derivative Audio quality metrics Linear prediction
在线阅读 下载PDF
A Survey on Different Feature Extraction and Classification Techniques Used in Image Steganalysis 被引量:1
12
作者 John Babu Sridevi Rangu Pradyusha Manogna 《Journal of Information Security》 2017年第3期186-202,共17页
Steganography is the process of hiding data into public digital medium for secret communication. The image in which the secret data is hidden is termed as stego image. The detection of hidden embedded data in the imag... Steganography is the process of hiding data into public digital medium for secret communication. The image in which the secret data is hidden is termed as stego image. The detection of hidden embedded data in the image is the foundation for blind image steganalysis. The appropriate selection of cover file type and composition contribute to the successful embedding. A large number of steganalysis techniques are available for the detection of steganography in the image. The performance of the steganalysis technique depends on the ability to extract the discriminative features for the identification of statistical changes in the image due to the embedded data. The issue encountered in the blind image steganography is the non-availability of knowledge about the applied steganography techniques in the images. This paper surveys various steganalysis methods, different filtering based preprocessing methods, feature extraction methods, and machine learning based classification methods, for the proper identification of steganography in the image. 展开更多
关键词 steganalysis STEGANOGRAPHY FEATURE EXTRACTION Classification
暂未订购
Steganalysis of LSB Matching Using Characteristic Function Moment of Pixel Differences 被引量:1
13
作者 Xianyi Chen Guangyong Gao +1 位作者 Dandan Liu Zhihua Xia 《China Communications》 SCIE CSCD 2016年第7期66-73,共8页
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) ma... Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public networks.This paper concentrates on steganalysis against spatial least significant bit(LSB) matching,which is the prototype of many advanced information hiding methods.Many existing algorithms deal with steganalysis problems by using the dependencies between adjacent pixels.From another aspect,this paper calculates the differences among pixel pairs and proves that the histogram of difference values will be smoothed by stego noises.We calculate the difference histogram characteristic function(DHCF) and deduce that the moment of DHCFs(DHCFM) will be diminished after stego bits are hidden in the image.Accordingly,we compute the DHCFMs as the discriminative features.We calibrate the features by decreasing the influence of image content on them and train support vector machine classifiers based on the calibrated features.Experimental results demonstrate that the DHCFMs calculated with nonadjacent pixels are helpful to detect stego messages hidden by LSB matching. 展开更多
关键词 information hiding steganalysis pixel differences nonadjacent pixels SVM
在线阅读 下载PDF
Game Theory Based False Negative Probability of Embedded Watermark Under Unintentional and Steganalysis Attacks 被引量:1
14
作者 HU Ziquan SHE Kun +1 位作者 WANG Jianghua TANG Jianguo 《China Communications》 SCIE CSCD 2014年第5期114-123,共10页
Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,how... Steganalysis attack is to statistically estimate the embedded watermark in the watermarked multimedia,and the estimated watermark may be destroyed by the attacker.The existing methods of false negative probability,however,do not consider the influence of steganalysis attack.This paper proposed the game theory based false negative probability to estimate the impacts of steganalysis attack,as well as unintentional attack.Specifically,game theory was used to model the collision between the embedment and steganalysis attack,and derive the optimal building embedding/attacking strategy.Such optimal playing strategies devote to calculating the attacker destructed watermark,used for calculation of the game theory based false negative probability.The experimental results show that watermark detection reliability measured using our proposed method,in comparison,can better reflect the real scenario in which the embedded watermark undergoes unintentional attack and the attacker using steganalysis attack.This paper provides a foundation for investigating countermeasures of digital watermarking community against steganalysis attack. 展开更多
关键词 digital watermarking false negative probability game theory watermark capacity steganalysis attack.
在线阅读 下载PDF
Steganalysis of Low Embedding Rate CNV-QIM in Speech
15
作者 Wanxia Yang Miaoqi Li +3 位作者 Beibei Zhou Yan Liu Kenan Liu Zhiyu Hu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第8期623-637,共15页
To address the difficulty of detecting low embedding rate and high-concealment CNV-QIM(complementary neighbor vertices-quantization index modulation)steganography in low bit-rate speech codec,the code-word correlation... To address the difficulty of detecting low embedding rate and high-concealment CNV-QIM(complementary neighbor vertices-quantization index modulation)steganography in low bit-rate speech codec,the code-word correlation model based on a BiLSTM(bi-directional long short-term memory)neural network is built to obtain the correlation features of the LPC codewords in speech codec in this paper.Then,softmax is used to classify and effectively detect low embedding rate CNV-QIM steganography in VoIP streams.The experimental results show that for speech steganography of short samples with low embedding rate,the BiLSTM method in this paper has a superior detection accuracy than state-of-the-art methods of the RNN-SM(recurrent neural network-steganalysis model)and SS-QCCN(simplest strong quantization codeword correlation network).At an embedding rate of 20%and a duration of 3 s,the detection accuracy of BiLSTM method reaches 75.7%,which is higher than that of RNNSM by 11.7%.Furthermore,the average testing time of samples(100%embedding)is 0.3 s,which shows that the method can realize real-time steganography detection of VoIP streams. 展开更多
关键词 CNV-QIM STEGANOGRAPHY BiLSTM steganalysis VOIP SPEECH
在线阅读 下载PDF
Steganalysis of MSU Stego Video Based on Block Matching of Interframe Collusion and Motion Detection
16
作者 REN Yanzhen WANG Mingjie +2 位作者 ZHAO Yanbin WANG Lina CAI Tingting 《Wuhan University Journal of Natural Sciences》 CAS 2012年第5期441-446,共6页
MSU Stego Video is a public video steganographic tool, which has strong robustness and is regarded as a real video steganographic tool. In order to increase the detection rate, this paper proposes a new steganoalysis ... MSU Stego Video is a public video steganographic tool, which has strong robustness and is regarded as a real video steganographic tool. In order to increase the detection rate, this paper proposes a new steganoalysis method against MSU, which uses the chessboard character of MSU embedded video, proposes a down-sample block-based collusion method to estimate the original frame and checks the chessboard mode of the different frame between tested frame and estimated frame to detect MSU steganographic evidences. To reduce the error introduced by severe movement of the video content, a method that abandons severe motion blocks from detecting is proposed. The experiment results show that the false negative rate of the proposed algorithm is lower than 5%, and the false positive rate is lower than 2%. Our algorithm has significantly better performance than existing algorithms. Especially to the video that has fast motion, the algorithm has more remarkable performance. 展开更多
关键词 MSU Stego Video video steganalysis block-based matching chessboard pattern motion detection
原文传递
Color Image Steganalysis Based on Residuals of Channel Differences
17
作者 Yuhan Kang Fenlin Liu +2 位作者 Chunfang Yang Xiangyang Luo Tingting Zhang 《Computers, Materials & Continua》 SCIE EI 2019年第4期315-329,共15页
This study proposes a color image steganalysis algorithm that extracts highdimensional rich model features from the residuals of channel differences.First,the advantages of features extracted from channel differences ... This study proposes a color image steganalysis algorithm that extracts highdimensional rich model features from the residuals of channel differences.First,the advantages of features extracted from channel differences are analyzed,and it shown that features extracted in this manner should be able to detect color stego images more effectively.A steganalysis feature extraction method based on channel differences is then proposed,and used to improve two types of typical color image steganalysis features.The improved features are combined with existing color image steganalysis features,and the ensemble classifiers are trained to detect color stego images.The experimental results indicate that,for WOW and S-UNIWARD steganography,the improved features clearly decreased the average test errors of the existing features,and the average test errors of the proposed algorithm is smaller than those of the existing color image steganalysis algorithms.Specifically,when the payload is smaller than 0.2 bpc,the average test error decreases achieve 4%and 3%. 展开更多
关键词 Color channel channel difference color image steganalysis STEGANOGRAPHY
在线阅读 下载PDF
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction
18
作者 Jun Li Minqing Zhang +2 位作者 Ke Niu Yingnan Zhang Xiaoyuan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2085-2103,共19页
Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detectio... Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detection performance,this paper proposes a steganalysis method that can perfectly detectMV-based steganography in HEVC.Firstly,we define the local optimality of MVP(Motion Vector Prediction)based on the technology of AMVP(Advanced Motion Vector Prediction).Secondly,we analyze that in HEVC video,message embedding either usingMVP index orMVD(Motion Vector Difference)may destroy the above optimality of MVP.And then,we define the optimal rate of MVP as a steganalysis feature.Finally,we conduct steganalysis detection experiments on two general datasets for three popular steganographymethods and compare the performance with four state-ofthe-art steganalysis methods.The experimental results demonstrate the effectiveness of the proposed feature set.Furthermore,our method stands out for its practical applicability,requiring no model training and exhibiting low computational complexity,making it a viable solution for real-world scenarios. 展开更多
关键词 Video steganography video steganalysis motion vector prediction motion vector difference advanced motion vector prediction local optimality
在线阅读 下载PDF
An Adaptive Image Calibration Algorithm for Steganalysis
19
作者 Xuyu Xiang Jiaohua Qin +2 位作者 Junshan Tan Neal N.Xiong 《Computers, Materials & Continua》 SCIE EI 2020年第2期963-976,共14页
In this paper,a new adaptive calibration algorithm for image steganalysis is proposed.Steganography disturbs the dependence between neighboring pixels and decreases the neighborhood node degree.Firstly,we analyzed the... In this paper,a new adaptive calibration algorithm for image steganalysis is proposed.Steganography disturbs the dependence between neighboring pixels and decreases the neighborhood node degree.Firstly,we analyzed the effect of steganography on the neighborhood node degree of cover images.Then,the calibratable pixels are marked by the analysis of neighborhood node degree.Finally,the strong correlation calibration image is constructed by revising the calibratable pixels.Experimental results reveal that compared with secondary steganography the image calibration method significantly increased the detection accuracy for LSB matching steganography on low embedding ratio.The proposed method also has a better performance against spatial steganography. 展开更多
关键词 Calibration algorithm neighborhood node degree ordinary pixel sensitive pixel steganalysis
在线阅读 下载PDF
General Steganalysis Method of Compressed Speech Under Different Standards
20
作者 Peng Liu Songbin Li +2 位作者 Qiandong Yan Jingang Wang Cheng Zhang 《Computers, Materials & Continua》 SCIE EI 2021年第8期1565-1574,共10页
Analysis-by-synthesis linear predictive coding(AbS-LPC)is widely used in a variety of low-bit-rate speech codecs.Most of the current steganalysis methods for AbS-LPC low-bit-rate compressed speech steganography are sp... Analysis-by-synthesis linear predictive coding(AbS-LPC)is widely used in a variety of low-bit-rate speech codecs.Most of the current steganalysis methods for AbS-LPC low-bit-rate compressed speech steganography are specifically designed for a specific coding standard or category of steganography methods,and thus lack generalization capability.In this paper,a general steganalysis method for detecting steganographies in low-bit-rate compressed speech under different standards is proposed.First,the code-element matrices corresponding to different coding standards are concatenated to obtain a synthetic code-element matrix,which will be mapped into an intermediate feature representation by utilizing the pre-trained dictionaries.Then,bidirectional long short-term memory is employed to capture long-term contextual correlations.Finally,a code-element affinity attention mechanism is used to capture the global inter-frame context,and a full connection structure is used to generate the prediction result.Experimental results show that the proposed method is effective and better than the comparison methods for detecting steganographies in cross-standard low-bit-rate compressed speech. 展开更多
关键词 Cross-standard compressed speech steganalysis ATTENTION
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部