Steganalysis
712 Followers
Recent papers in Steganalysis
We propose a steganalytic algorithm for triangle meshes, based on the supervised training of a classifier by discriminative feature vectors. After a normalization step, the triangle mesh is calibrated by one step of Laplacian smoothing... more
Blind image steganalysis (BIS) is the process of detecting whether an input image has hidden data or not, without any prior known information ( i.e., blind) on the applied steganography technique. Recent BIS approaches typically suffer... more
introduced in 2003, is a techniques used for hidden communication between two covert parties. It is an art of hidden communication. It also relates to the areas like network protocols and security for practical data hiding in... more
During the last decades, Steganography has found many applications. Many steganographic systems have been developed and used in various areas, e.g., in digital assets (DRM), Telecommunications, Medicine etc. In this paper, we prove that... more
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
—This paper presents a keystroke dynamics system for mobile devices that employs a statistical distance-to-median anomaly detector. The selected feature set combines the keystroke timing features of hold and latency and the touch screen... more
Özet: Tarih boyunca, insanoğlu toplumsal dokunun gelişmesi ile bilgi alışverişi için birçok yöntem kullanmıştır. Sosyal hayatın gelişmesi, ülkeler arasındaki siyasal ve toplumsal ilişkilerin önemini arttırmıştır. Toplumlar arasındaki... more
A new steganography scheme using a reference image is proposed with two variants. In the first kind, secret text bits are directly embedded into the cover image after encryption using a reference image. In the second variant secret text... more
The process of jumbling up the contents of a secret message so as to secure it, is known as cryptography, whereas the process of hiding the very existence of a secret message is known as steganography. The term "steganography" describes... more
Steganisis is used to detect or extract hidden information. It is a set of techniques: visual or statistical, through which it is possible to verify the existence of steganography content. The preservation and role tools important in... more
This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic... more
Since people use internet daily they have to take care about information security requirement more and more. In this wok a new algorithm for RGB based images steganography is presented. The algorithm uses LSB principle for hiding a... more
Embedding a message in media files, also known as steganography, is a common approach to hide secret information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure , tools have been developed... more
Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved... more
Digital watermarking [1] is the act of hiding information in multimedia data, for the purposes of content protection or authentication. In ordinary digital watermarking, the secret information is embedded into the multimedia data (cover... more
Steganalisi pada image BMP dengan teknik Crystalize dan Histogram
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of... more
Steganalysis is an anti-steganography method aiming to detect secret message’s presence that is embedded inside an innocent looking medium. Usually, some steganalysis technique cannot be used universally because it is developed in order... more
This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this... more