Skip to main content
We propose a steganalytic algorithm for triangle meshes, based on the supervised training of a classifier by discriminative feature vectors. After a normalization step, the triangle mesh is calibrated by one step of Laplacian smoothing... more
    • by 
    •   5  
      Information SystemsComputer ScienceDistributed ComputingComputer Software
Blind image steganalysis (BIS) is the process of detecting whether an input image has hidden data or not, without any prior known information ( i.e., blind) on the applied steganography technique. Recent BIS approaches typically suffer... more
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceSteganalysisConvolutional Neural Network
introduced in 2003, is a techniques used for hidden communication between two covert parties. It is an art of hidden communication. It also relates to the areas like network protocols and security for practical data hiding in... more
    • by 
    •   3  
      ChannelComputer ApplicationsSteganalysis
During the last decades, Steganography has found many applications. Many steganographic systems have been developed and used in various areas, e.g., in digital assets (DRM), Telecommunications, Medicine etc. In this paper, we prove that... more
    • by 
    •   17  
      Number TheoryImage ProcessingInformaticsTelecommunications
    • by 
    •   13  
      Information TechnologySteganographyCalibrationInformation Hiding
    • by 
    •   8  
      Mechanical EngineeringDigital MediaDigital Signal ProcessingSteganography
HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or... more
    • by 
    •   2  
      Computer ScienceSteganalysis
—This paper presents a keystroke dynamics system for mobile devices that employs a statistical distance-to-median anomaly detector. The selected feature set combines the keystroke timing features of hold and latency and the touch screen... more
    • by 
    •   4  
      Image ProcessingSteganalysisBehavioural BiometricsKeystroke Dynamics
This article introduces a new technique to hide text-in-text messages. The proposed mechanism uses the structure of omega network to hide and extract secret messages. The generation of secret message is made as follows, take every letter... more
    • by  and +1
    •   5  
      CryptographyDigital Data HidingSteganographyCyber Security
Özet: Tarih boyunca, insanoğlu toplumsal dokunun gelişmesi ile bilgi alışverişi için birçok yöntem kullanmıştır. Sosyal hayatın gelişmesi, ülkeler arasındaki siyasal ve toplumsal ilişkilerin önemini arttırmıştır. Toplumlar arasındaki... more
    • by 
    •   3  
      Image Processing and steganographyImage SteganographySteganalysis
    • by 
    •   12  
      EngineeringTechnologyImage ProcessingSignal Processing
    • by 
    •   20  
      EngineeringTechnologyImage ProcessingSignal Processing
    • by 
    •   2  
      Frequency-domain analysisSteganalysis
    • by 
    •   5  
      Computer ScienceImage ProcessingCryptographySteganography
    • by 
    •   5  
      Computer VisionImage ProcessingSteganographySecurity Attacks in Manets
A new steganography scheme using a reference image is proposed with two variants. In the first kind, secret text bits are directly embedded into the cover image after encryption using a reference image. In the second variant secret text... more
    • by 
    •   5  
      Image SteganographySteganalysisLSB steganographyImage Inside Image Data Hiding
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or recovered by unauthorized... more
    • by  and +1
    •   6  
      EncryptionSteganographySteganalysisPermutation
The process of jumbling up the contents of a secret message so as to secure it, is known as cryptography, whereas the process of hiding the very existence of a secret message is known as steganography. The term "steganography" describes... more
    • by 
    •   4  
      CryptographySteganographySteganalysisImage Procerssing
    • by 
    •   14  
      Pattern RecognitionCategorizationNeural NetworkSteganography
    • by 
    •   20  
      EngineeringTechnologyImage ProcessingSignal Processing
    • by 
    •   2  
      Computer ScienceSteganalysis
Steganisis is used to detect or extract hidden information. It is a set of techniques: visual or statistical, through which it is possible to verify the existence of steganography content. The preservation and role tools important in... more
    • by 
    •   4  
      Computer ForensicsSteganographyDigital ForensicsSteganalysis
    • by 
    •   11  
      EngineeringEmbedded SystemsSteganographyEdge Detection
    • by 
    •   11  
      EngineeringEmbedded SystemsSteganographyEdge Detection
This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic... more
    • by 
    •   15  
      Artificial IntelligenceNatural Language ProcessingEvolutionary algorithmsGenetic Algorithm
The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information... more
    • by  and +1
    •   20  
      Optical EngineeringComputer VisionImage ProcessingPattern Recognition
    • by 
    •   5  
      VideoSteganographyInformation HidingSteganalysis
    • by 
    •   19  
      EngineeringSupport Vector MachinesMarkov ProcessesSteganography
Since people use internet daily they have to take care about information security requirement more and more. In this wok a new algorithm for RGB based images steganography is presented. The algorithm uses LSB principle for hiding a... more
    • by 
    •   15  
      Computer ScienceComputer Security And ReliabilityComputer SecurityNetwork Steganography
Embedding a message in media files, also known as steganography, is a common approach to hide secret information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure , tools have been developed... more
    • by 
    •   2  
      SteganalysisImage Steganography and Steganalysis
Steganalysis means analysis of stego images. Like cryptanalysis, steganalysis is used to detect messages often encrypted using secret key from stego images produced by steganography techniques. Recently lots of new and improved... more
    • by 
    •   3  
      Network SecurityDigital Image Data Hiding TechniquesSteganalysis
Digital watermarking [1] is the act of hiding information in multimedia data, for the purposes of content protection or authentication. In ordinary digital watermarking, the secret information is embedded into the multimedia data (cover... more
    • by 
    •   2  
      SecuritySteganalysis
Steganalisi pada image BMP dengan teknik Crystalize dan Histogram
    • by 
    •   4  
      SteganographyHistogramSteganalysisAnalisis
This paper presents a new blind approach of image Steganalysis based on contourlet transform and non linear support vector machine. Properties of Contourlet transform are used to extract features of images, and non linear support vector... more
    • by  and +1
    •   3  
      SteganalysisContourlet TransformStructural Similarity Index Measurement (SSIM)
    • by 
    •   6  
      Computer ScienceImage ProcessingCryptographySteganography
    • by 
    •   8  
      Mechanical EngineeringDigital MediaDigital Signal ProcessingSteganography
    • by 
    •   3  
      CryptographySteganographySteganalysis
    • by 
    •   4  
      Image ProcessingSteganographyData HidingSteganalysis
    • by 
    •   8  
      SteganographyLogistic RegressionInformation HidingSupport vector machine
    • by 
    •   20  
      EngineeringTechnologyImage ProcessingSignal Processing
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of... more
    • by 
    •   4  
      Network SecuritySecurityDigital Data HidingSteganalysis
    • by 
    •   6  
      Computer ScienceImage ProcessingCryptographyInformation Hiding
    • by 
    •   7  
      Computational ComplexitySteganographyWaveletsQuality Factor
    • by 
    •   8  
      SteganographyData HidingKernel Density EstimationMode
    • by 
    •   22  
      AlgorithmsImage ProcessingRemote SensingDatabases
Steganalysis is an anti-steganography method aiming to detect secret message’s presence that is embedded inside an innocent looking medium. Usually, some steganalysis technique cannot be used universally because it is developed in order... more
    • by 
    • Steganalysis
In order to analyze how the correlativity behavioral pattern would change after data embedding, wide flat region theme photos have been embedded from 1 to 5 bits out of eight bits per channel. Keywords: artificial intelligence, multimedia... more
    • by  and +1
    •   3  
      Digital Image CorrelationStatistical ModelingSteganalysis
    • by 
    •   4  
      Image ProcessingCryptographyAudio SteganographySteganalysis
    • by 
    •   4  
      Information SecuritySteganographyPredictive codingSteganalysis
This paper presents study about how to hide the useful information and give the superficial knowledge of Steganography, compare encryption, and cryptography. This paper describes the present, past and future of Steganography. In this... more
    • by 
    •   3  
      CryptographySteganalysisDigital Image Processing and Image Forensics