The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a steganalytic method to attack the enhanced BPCS steganography (for short EBPCS) proposed by Niimi et al. The key element of the method is analysis of the bitplane-block complexity difference sequences between stego images and cover images based on Hilbert-Huang transform. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition...
Current steganalytic schemes for JPEG steganography are in favor of extracting features in DCT (Discrete Cosine Transform) domain and/or spatial domain. A recently proposed compressed frequency domain based universal steganalytic algorithm [21] showed concern over the statistics of Huffman compressed stream. The authors claimed that it was very effective in detecting stego images embedded by JPEG...
Passive multimedia forensics has become an active topic in recent years. However, the research on video forensics, and especially on automatic detection of object-based video forgery is still in its infancy. In this paper, we develop an approach for automatic identification of object-based forged video encoded with advanced frameworks based on its GOP (Group Of Pictures) structure. The proposed approach...
In this paper, we point out that SRM (Spatial-domain Rich Model), the most successful steganalysis framework of digital images possesses a similar architecture to CNN (convolutional neural network). The reasonable expectation is that the steganalysis performance of a well-trained CNN should be comparable to or even better than that of the hand-coded SRM. However, a CNN without pre-training always...
The adaptive pixel-value differencing steganography proposed by Luo et al. is a state-of-the-art content-adaptive steganographic method which resists blind steganalytic attacks. In this paper, the authors point out that the combination of rotate operation and ternary embedding units in the adaptive pixel-value differencing steganography introduces intrinsic statistical imbalance which can be used...
In this paper, we present a steganalytic method to attack JPEG2000 lazy-mode steganography proposed by Su et al. The key element of the method is the Hilbert-Huang transform based analysis of the code-block noise variance sequences of stego images and non-stego noisy images. The Hilbert transform based characteristic vectors are constructed via empirical mode decomposition of the sequences and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.