The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Discrete wavelet transform has both good qualities in time domain and frequency domain which is an ideal tool in analyzing unsteady signals. Discrete cosine transform is one of the approaches used in image compressing which is also used to extract features. This paper proposes a combined feature extraction method which is based on DWT and DCT for face recognition. First the original face image is...
Jsteg and F5 are two typical steganography methods of JPEG images and have been used widely. To distinguish F5 stego images and Jsteg stego images, a classification algorithm based on sensitive features and SVM classifier is presented, where the sensitive features are extracted from the subband coefficients of those stego-images and the subband coefficients are obtained by wavelet packet decomposition...
In this paper we propose a new method for feature extraction in the context of still image steganalysis. At first, a denoising algorithm is employed to generate a new version of the observation form the original image. FastICA is employed to separate two sources from the two versions of the input image. Features are extracted from these two estimated sources. At the end support vector machine (SVM)...
Although brain activation in relation to tactile stimulation is well studied, the central processing of texture coding in humans is poorly understood. To explore such dynamics, we used a robotic setup to produce well-controlled stimuli consisting of two different textures (gratings of spatial period combinations 520+1920 mum and 400+1920 mum) which were moved across a subject's finger pad during electro-encephalograpy...
This paper presents a new scheme for steganalysis of random LSB embedding, capable of applying to any kind of digital signal in both spatial and transform domains. The proposed scheme is based on defining a space whose elements relate to higher-order statistical properties of the signal and looking for special subsets, which we call closure of sets (CoS) in this space. We use this scheme for steganalysis...
This paper proposed a new steganalysis scheme of LSB-matching steganography based on statistical moments of the DFT of histogram of multi-level wavelet subbands. Before deriving these wavelet subbands a pre-processing apply to images under the test. The pre-processing contains removing some most significant bit planes. Then we decompose the image using three-level Haar discrete wavelet transform (DWT)...
The artifacts by JPEG recompression have been demonstrated to be useful in passive image authentication. In this paper, we focus on the shifted double JPEG problem, aiming at identifying if a given JPEG image has ever been compressed twice with inconsistent block segmentation. We formulated the shifted double JPEG compression (SD-JPEG) as a noisy convolutive mixing model mostly studied in blind source...
Steganography techniques can be used to convey hidden information. If done well, the information is difficult to discover and is unknown to an observer. The detection of steganography, known as steganalysis, is an important research pursuit. In previous work, we developed a method of steganalysis for images with messages embedded by an LSB plusmn1 scheme. Our method uses lossless image compression...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.