Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes - Publication - Bridge of Knowledge

Search

Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes

Abstract

The paper concerns blind steganalysis techniques in the passive steganalysis scenario designed to detect the steganographic cover modification schemes. The goal is to investigate the state-of-art in the field of steganalysis, and, above all, to recognize current trends existing in this field and determine guidelines for constructions of new steganalysis schemes. The intended effects are to examine the possibilities for the development of knowledge in the field of steganography and to set directions for future research.

Citations

  • 0

    CrossRef

  • 0

    Web of Science

  • 0

    Scopus

Cite as

Full text

download paper
downloaded 355 times
Publication version
Accepted or Published Version
License
Copyright (Author)

Keywords

Details

Category:
Articles
Type:
artykuły w czasopismach recenzowanych i innych wydawnictwach ciągłych
Published in:
Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne pages 1121 - 1125,
ISSN: 1230-3496
Language:
English
Publication year:
2017
Bibliographic description:
Czaplewski B.: Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes// Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne. -., nr. 10 (2017), s.1121-1125
DOI:
Digital Object Identifier (open in new tab) 10.15199/59.2017.10.3
Bibliography: test
  1. Fridrich J., "Steganography in Digital Media: Principles, Algorithms, and Applications", Cambridge, UK: Cambridge University press, ISBN: 978-0-521-19019-0, 2010. open in new tab
  2. Westfeld A., High capacity despite better steganalysis (F5 -a stega- nographic algorithm), information Hiding, 4 th Int. Workshop, vol. 2137 of Lecture Notes in Computer Science, pp. 289-302, 2001. open in new tab
  3. Kodovský J., J. Fridrich, influence of embedding strategies on security of steganographic methods in the JpeG domain, Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 02-1-02-13, 2008. open in new tab
  4. Fridrich J., M. Goljan, D. Soukal, efficient wet paper Codes, information Hiding. 7th International Workshop, LNCS vol. 3727, pp. 204-218, 2005. open in new tab
  5. Li Z., K. Lu, X. Zeng, X. Pan, Feature-Based steganalysis for JpeG images, Int. Conf. Digital Image Processing, pp. 76-80, 2009. open in new tab
  6. Deng Q.L., J.J. Lin, a Universal steganalysis Using Features Derived from the Differential image Histogram in Frequency Domain, CISP '09. 2nd Int. Congress on Image and Signal Processing, pp. 1-4, 2009. open in new tab
  7. Yu W., Z. Li, L. Ping, Blind detection for JpeG steganography, Int. Conf. on Networking and Information Technology (ICNIT), pp. 128-132, 2010.
  8. Deng Q.L., The blind detection of information hiding in color image, 2nd Int. Conf. on Computer Engineering and Technology (ICCET), vol. 7, pp. V7-346-V7-348, 2010.
  9. Joo J.C., T.W. Oh, J.H. Choi, H.K. Lee, steganalysis scheme Using the Difference image of Calibrated sub-sampling, 6th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 51-54, 2010. open in new tab
  10. Fridrich J., "Rich Models for Steganalysis of Digital Images", ieee Transactions on information Forensics and security, vol. 7, no. 3, 2012. open in new tab
  11. Tan S., B. Li, "Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images", Asia-Pacific Signal and Information Processing Association", 2014 annual Summit and Conference (APSIPA), 2014. open in new tab
  12. Pibre L., J. Pasquet, D. Ienco, M. Chaumont, Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch, IS&T. Media Watermarking, Security and Forensics, Part of IS&T Int. Symp. On Electronic Imaging, 2016. open in new tab
  13. Xu G., H. Wu, Y.Q. Shi, "Ensemble of CNNs for Steganalysis: An Empi- rical Study", proceedings of the 4th aCM workshop on information Hiding and Multimedia security, pp. 103-107, 2016. open in new tab
  14. Couchot J., R. Couturier, C. Guyeux, M. Salomon, steganalysis via a Convolutional Neural Network using large Convolution Filters, CoRR abs/1605.0794, 2016.
  15. Yu X.Y., A. Wang, an investigation of Genetic algorithm on steganalysis Techniques, 5th Int. Conf. Intelligent Information Hiding and Multime- dia Signal Processing, pp. 1118-1121, 2009. open in new tab
  16. Yu X.Y., A. Wang, steganalysis Based on Regression Model and Bay- esion Network, Int. Conf. Multimedia Information Networking and Security, vol. 1, pp. 41-44, 2009. open in new tab
  17. Yu X.Y., A. Wang, steganalysis Based on Bayesion Network and Gene- tic algorithm, 2nd Int. Congress on Image and Signal Processing CISP '09, pp. 1-4, 2009. open in new tab
  18. Sheikhan M., M.S. Moin, M. Pezhmanpour, Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform; 10th Int. Conf. Intelligent Systems Design and Applications (ISDA), pp. 368-372, 2010. open in new tab
  19. Veena H.B., S. Krishna, P.D. Shenoy, sURF: steganalysis using random forests, 10th Int. Conf. Intelligent Systems Design and Applications (ISDA), pp. 373-378, 2010. open in new tab
  20. Ke K., T. Zhao, O. Li, Bhattacharyya Distance for Blind image stega- nalysis; Int. Conf. Multimedia Information Networking and Security (MINES), pp. 658-661, 2010. open in new tab
  21. Holoska J., Z. Oplatkova, I. Zelinka, R. Senkerik, Comparison betwe- en Neural Network steganalysis and linear Classification Method stegdetect, 2nd Int. Conf. Computational Intelligence, Modelling and Simulation, pp. 15 -20, 2010. open in new tab
  22. Zhang F., Quaternion and Matrices of Quaternions, linear algebra and its applications, Elsevier Science Inc., pp. 21-57, 1997. open in new tab
  23. Baker M.J., Maths -Quaternions, http://www.euclideanspace.com/ maths/algebra/realNormedAlgebra/quaternions/index.htm, date: 18.06.2014.
  24. Dzwonkowski M., M. Papaj, R. Rykaczewski, "A New Quaternion- -Based Encryption Method for DICOM Images", IEEE Transactions on Image Processing, vol. 24, issue 11, pp. 4614-4622, 2015. open in new tab
  25. Dzwonkowski M., R. Rykaczewski, "Quaternion Feistel Cipher with an infinite key space based on quaternion Julia sets", Journal of Telecom- munications and information Technology, vol. 4, pp. 15-21, 2015. open in new tab
  26. Czaplewski B., R. Rykaczewski, "Receiver-side fingerprinting method for color images based on a series of quaternion rotations", przegląd Telekomunikacyjny i wiadomości Telekomunikacyjne / Telecommuni- cation Review + Telecommunication News, vol. 8-9, pp. 1127-1134, 2015. open in new tab
  27. Czaplewski B.,"Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining", Journal of Visual Communication and image Representation, vol. 40, part A, pp. 1-13, 2016. open in new tab
  28. Ge H., H. Liu and Z. Jin, key Technical analysis on steganography and steganalysis, 3rd Int. Conf. Multimedia Technology ICMT, 2013.
  29. Lin J.Q.; S.P. Zhong, JpeG image steganalysis method based on binary similarity measures, Int. Conf. on Machine Learning and Cyber- netics, vol. 4, pp. 2238-2243, 2009.
  30. Yang G., H. Zhang, Using Higher Order DCT Difference to effective improve Markov process Based JpeG steganalysis Detection Rate, Asia-Pacific Conf. Information Processing, vol. 2, pp. 47-50, 2009.
  31. Liu S., L. Ma, H. Yao, D. Zhao, Universal steganalysis Based on stati- stical Models Using Reorganization of Block-based DCT Coefficients, 5th Int. Conf. Information Assurance and Security IAS '09, vol. 1, pp. 778-781, 2009. open in new tab
  32. He Z.M.; W.W.Y. Ng, P.P.K. Chan, D.S. Yeung, steganography detection using localized generalization error model, IEEE Int. Conf. Systems Man and Cybernetics (SMC), pp. 1544-1549, 2010.
  33. Chen Q., S. Zhong, Universal steganographic Detection algorithmin in JpeG image Using the Data-Dependent kernel, 3th Int. Symposium on Electronic Commerce and Security (ISECS), pp. 232-236, 2010.
  34. Bhat V.H., S. Krishna, P.D. Shenoy, K.R. Venugopal, L.M. Patnaik, HUBFiRe -a multi-class sVM based JpeG steganalysis using HBCl statistics and Fr index, Int. Conf. Security and Cryptography, pp. 1-6, 2010. open in new tab
  35. Ping Q., C. Li-ya, W. Meng, a universal steganalysis to steganogra- phic images on frequency domain, Int. Conference E-Business and E -Government (ICEE), pp. 1-5, 2011.
  36. Anitha P. T., M. Rajaram, S. N. Sivanandham, "Neural Network Based Steganalysis Framework to Detect Stego-Contents in Corporate Ema- ils", international Journal of emerging Technology and advanced engi- neering, vol. 2, issue 3, 2012.
  37. Geetha S., S.S. Sindhu, N. Ishwarya, A. Mohan, P. Amuthayazhini, N. Kamaraj, intelligent detection of lsB stego anomalies in images using soft computing paradigms; Int. Conf. Methods and Models in Computer Science, pp. 1-5, 2009. open in new tab
  38. Sun Z., H. Li, Z. Wu, Z. Zhou, an image steganalysis Method Based on Characteristic Function Moments of wavelet subbands, Int. Conf. Artificial Intelligence and Computational Intelligence, vol. 1, pp. 291- 295, 2009. open in new tab
  39. Yang X., S. Wang, J. Liu, Universal steganalysis to images with wBMC Model, 5 th Int. Conf. Information Assurance and Security, vol. 2, pp 627-630, 2009.
  40. Ramezani M., S. Ghaemmaghami, Towards Genetic Feature selection in image steganalysis, 7th IEEE Consumer Communications and Networking Conference, pp. 1-4, 2010. open in new tab
  41. Gireesh Kumar T., R. Jithin, D.D. Shankar, Int.Conf. Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics Advances in Computer Engineering, pp. 298-300.
  42. Li H.; Z. Sun, Z. Zhou, an image steganalysis method based on charac- teristic function moments and pCa, 30th Chinese Control Conference (CCC), pp. 3005-3008, 2011.
  43. Yang X., Y. Lei, X. Pan, J. Liu, Universal image steganalysis Based on wavelet packet Decomposition and empirical Transition Matrix in wavelet Domain; Int. Forum on Computer Science, Technology and Applications IFCSTA '09, vol. 2 pp. 179-182, 2009.
  44. He F., S. Zhong, K. Chen. "An Effective Ensemble-based Classification Algorithm for High-Dimensional Steganalysis", Journal of software, vol. 9, no. 7, 2014. Portal Informacji Technicznej www.sigma-not.pl największa baza publikacji technicznych on-line open in new tab
Verified by:
Gdańsk University of Technology

seen 125 times

Recommended for you

Meta Tags