Robinette et al., 2023 - Google Patents
SUDS: sanitizing universal and dependent steganographyRobinette et al., 2023
View PDF- Document ID
- 3263791117772115254
- Author
- Robinette P
- Wang H
- Shehadeh N
- Moyer D
- Johnson T
- Publication year
- Publication venue
- ECAI 2023
External Links
Snippet
Steganography, or hiding messages in plain sight, is a form of information hiding that is most commonly used for covert communication. As modern steganographic mediums include images, text, audio, and video, this communication method is being increasingly used by …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Baluja | Hiding images in plain sight: Deep steganography | |
CN108509775B (en) | Malicious PNG image identification method based on machine learning | |
Zhao et al. | Watermarking graph neural networks by random graphs | |
Jain et al. | Adversarial Detection Avoidance Attacks: Evaluating the robustness of perceptual hashing-based client-side scanning | |
CN110933105B (en) | Web attack detection method, system, medium and equipment | |
Hussain et al. | Stego optical encryption based on chaotic S-box transformation | |
Wang et al. | Evilmodel 2.0: bringing neural network models into malware attacks | |
Ma et al. | Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking | |
Taran et al. | Clonability of anti-counterfeiting printable graphical codes: a machine learning approach | |
Robinette et al. | SUDS: sanitizing universal and dependent steganography | |
Kumar et al. | Steganography techniques using convolutional neural networks | |
Guarascio et al. | Revealing MageCart-like threats in favicons via artificial intelligence | |
Cassavia et al. | Detection of steganographic threats targeting digital images in heterogeneous ecosystems through machine learning | |
Lv et al. | Ssl-wm: A black-box watermarking approach for encoders pre-trained by self-supervised learning | |
Wang et al. | GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning | |
Anis et al. | A reframed watermark extraction approach using the ABC algorithm | |
Ali et al. | Optimizing region of interest selection for effective embedding in video steganography based on genetic algorithms | |
Kich et al. | Image steganography scheme using dilated convolutional network | |
Köhler et al. | Protecting information with subcodstanography | |
Chinniyan et al. | Image Steganography Using Deep Neural Networks. | |
Ramandi et al. | VidaGAN: Adaptive GAN for image steganography | |
Robinette et al. | Monsters in the Dark: Sanitizing Hidden Threats with Diffusion Models | |
Gao et al. | An Improved Image Processing Based on Deep Learning Backpropagation Technique | |
Tiwary et al. | Different image steganography techniques: an overview | |
Das et al. | An efficient lightweight LSB steganography with deep learning steganalysis |