The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: multimedia security; multimedia social network; trusted computing; multimedia computing; network security; watermarking; steganography; Internet-based services; and multimedia service application.
Public-key watermarking methods should have two properties: (1) allowing everyone to determine whether a watermark exists in an image or not; (2) having a high detection probability in case of malicious modification. This paper proposes a pollution attack which pollutes the watermark embedded in an image with an optimal color noise and hence fools the detector of the public-key watermarking scheme...
The issue of ownership of digital watermark is addressed in this paper. An audio watermarking scheme is presented where the biometric pattern of iris is used to generate the watermark that has a stamp of ownership. The watermark is embedded in the high-energy regions selectively, which makes the embedding process robust against cropping and synchronization attacks. Experimental results of listening...
In this paper a new steganographic algorithm is proposed which can resist the calibration based blind steganalytic attack in JPEG domain steganography. The calibration attack is one of the most successful attacks to break the JPEG steganographic algorithms in recent past. One of the important features for the calibration attack is the prediction of cover image statistics from the stego image. To resist...
We propose a passive image splicing detection method based on consistency check of camera characteristics among different areas in an image. For a given image, we compute color sharpness from pixels and inter-channel singular value difference. Each color channel is independently down-sampled with a factor of two in the x and y directions. The down-sampled color image is then expanded by zero-padding,...
Due to the widespread use of sophisticated imaging tools, digital image forgeries have already become a serious social problem. In this paper, we proposes an efficient and robust algorithm for detection of a specific category of digital image forgery known as region duplication forgery, which is done by copying a block of an image and pasting it on to some other block of the same image. The image...
In steganographic applications, the data-hiders always hope to lower the distortion level and to preserve the original data distribution. A novel histogram-preserving and distortion-constraining steganographic scheme is proposed in the present work. After decomposing cover samples into a series of binary sequences, a number of candidate vectors representing each secret bit-block are produced, and...
In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have been identified in VoIP protocols. To avoid such security gaps in the future, we argue that stegocommunication should be added to the traditional list of network threats: interruption,...
In this paper, we propose a feature generation and classification approach for universal steganalysis based on genetic algorithm (GA) and higher order statistics. The GA is utilized to select a subset of candidate features, a subset of candidate transformations to generate new features. The logistic regression model and Bayesian network model are then used as the classifier. Experimental results show...
We proposes a method to estimate secret message length of secret message embedded using quantization index modulation (QIM) based data hiding in digital images. The Secret Message Length estimation equation is constructed used for embedding ratio estimation. Our experimental results have demonstrated that the proposed steganalyzers can is a reliably way to estimate the secret message length of QIM...
In this paper we present a distortionless data hiding technique based on wavelet-like transform, known as Slantlet Transform (SLT). The proposed algorithm first encodes the original message using the encoder, T-codes. T-codes have shown to be more robust than the best known variable-length codes, Huffman codes. T-codes have a well-explained resyhchronization mechanism which leads to fast and reliable...
In order to design the image hash from human being's view, we capture the perceptual characters of the image using Gabor filter which can sense the directions in the image just like human's primary visual cortex. For a given image, we compute the reference scale, direction and block to make sure the final hash can resist against RST (Rotation, Scale, Translation) attacks while maintain the sensitivity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.