Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes
Abstract
The paper concerns blind steganalysis techniques in the passive steganalysis scenario designed to detect the steganographic cover modification schemes. The goal is to investigate the state-of-art in the field of steganalysis, and, above all, to recognize current trends existing in this field and determine guidelines for constructions of new steganalysis schemes. The intended effects are to examine the possibilities for the development of knowledge in the field of steganography and to set directions for future research.
Citations
-
0
CrossRef
-
0
Web of Science
-
0
Scopus
Author (1)
Cite as
Full text
download paper
downloaded 355 times
- Publication version
- Accepted or Published Version
- License
- Copyright (Author)
Keywords
Details
- Category:
- Articles
- Type:
- artykuły w czasopismach recenzowanych i innych wydawnictwach ciągłych
- Published in:
-
Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne
pages 1121 - 1125,
ISSN: 1230-3496 - Language:
- English
- Publication year:
- 2017
- Bibliographic description:
- Czaplewski B.: Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes// Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne. -., nr. 10 (2017), s.1121-1125
- DOI:
- Digital Object Identifier (open in new tab) 10.15199/59.2017.10.3
- Bibliography: test
-
- Fridrich J., "Steganography in Digital Media: Principles, Algorithms, and Applications", Cambridge, UK: Cambridge University press, ISBN: 978-0-521-19019-0, 2010. open in new tab
- Westfeld A., High capacity despite better steganalysis (F5 -a stega- nographic algorithm), information Hiding, 4 th Int. Workshop, vol. 2137 of Lecture Notes in Computer Science, pp. 289-302, 2001. open in new tab
- Kodovský J., J. Fridrich, influence of embedding strategies on security of steganographic methods in the JpeG domain, Proc. SPIE, Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 02-1-02-13, 2008. open in new tab
- Fridrich J., M. Goljan, D. Soukal, efficient wet paper Codes, information Hiding. 7th International Workshop, LNCS vol. 3727, pp. 204-218, 2005. open in new tab
- Li Z., K. Lu, X. Zeng, X. Pan, Feature-Based steganalysis for JpeG images, Int. Conf. Digital Image Processing, pp. 76-80, 2009. open in new tab
- Deng Q.L., J.J. Lin, a Universal steganalysis Using Features Derived from the Differential image Histogram in Frequency Domain, CISP '09. 2nd Int. Congress on Image and Signal Processing, pp. 1-4, 2009. open in new tab
- Yu W., Z. Li, L. Ping, Blind detection for JpeG steganography, Int. Conf. on Networking and Information Technology (ICNIT), pp. 128-132, 2010.
- Deng Q.L., The blind detection of information hiding in color image, 2nd Int. Conf. on Computer Engineering and Technology (ICCET), vol. 7, pp. V7-346-V7-348, 2010.
- Joo J.C., T.W. Oh, J.H. Choi, H.K. Lee, steganalysis scheme Using the Difference image of Calibrated sub-sampling, 6th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, pp. 51-54, 2010. open in new tab
- Fridrich J., "Rich Models for Steganalysis of Digital Images", ieee Transactions on information Forensics and security, vol. 7, no. 3, 2012. open in new tab
- Tan S., B. Li, "Stacked Convolutional Auto-Encoders for Steganalysis of Digital Images", Asia-Pacific Signal and Information Processing Association", 2014 annual Summit and Conference (APSIPA), 2014. open in new tab
- Pibre L., J. Pasquet, D. Ienco, M. Chaumont, Deep learning is a good steganalysis tool when embedding key is reused for different images, even if there is a cover sourcemismatch, IS&T. Media Watermarking, Security and Forensics, Part of IS&T Int. Symp. On Electronic Imaging, 2016. open in new tab
- Xu G., H. Wu, Y.Q. Shi, "Ensemble of CNNs for Steganalysis: An Empi- rical Study", proceedings of the 4th aCM workshop on information Hiding and Multimedia security, pp. 103-107, 2016. open in new tab
- Couchot J., R. Couturier, C. Guyeux, M. Salomon, steganalysis via a Convolutional Neural Network using large Convolution Filters, CoRR abs/1605.0794, 2016.
- Yu X.Y., A. Wang, an investigation of Genetic algorithm on steganalysis Techniques, 5th Int. Conf. Intelligent Information Hiding and Multime- dia Signal Processing, pp. 1118-1121, 2009. open in new tab
- Yu X.Y., A. Wang, steganalysis Based on Regression Model and Bay- esion Network, Int. Conf. Multimedia Information Networking and Security, vol. 1, pp. 41-44, 2009. open in new tab
- Yu X.Y., A. Wang, steganalysis Based on Bayesion Network and Gene- tic algorithm, 2nd Int. Congress on Image and Signal Processing CISP '09, pp. 1-4, 2009. open in new tab
- Sheikhan M., M.S. Moin, M. Pezhmanpour, Blind image steganalysis via joint co-occurrence matrix and statistical moments of contourlet transform; 10th Int. Conf. Intelligent Systems Design and Applications (ISDA), pp. 368-372, 2010. open in new tab
- Veena H.B., S. Krishna, P.D. Shenoy, sURF: steganalysis using random forests, 10th Int. Conf. Intelligent Systems Design and Applications (ISDA), pp. 373-378, 2010. open in new tab
- Ke K., T. Zhao, O. Li, Bhattacharyya Distance for Blind image stega- nalysis; Int. Conf. Multimedia Information Networking and Security (MINES), pp. 658-661, 2010. open in new tab
- Holoska J., Z. Oplatkova, I. Zelinka, R. Senkerik, Comparison betwe- en Neural Network steganalysis and linear Classification Method stegdetect, 2nd Int. Conf. Computational Intelligence, Modelling and Simulation, pp. 15 -20, 2010. open in new tab
- Zhang F., Quaternion and Matrices of Quaternions, linear algebra and its applications, Elsevier Science Inc., pp. 21-57, 1997. open in new tab
- Baker M.J., Maths -Quaternions, http://www.euclideanspace.com/ maths/algebra/realNormedAlgebra/quaternions/index.htm, date: 18.06.2014.
- Dzwonkowski M., M. Papaj, R. Rykaczewski, "A New Quaternion- -Based Encryption Method for DICOM Images", IEEE Transactions on Image Processing, vol. 24, issue 11, pp. 4614-4622, 2015. open in new tab
- Dzwonkowski M., R. Rykaczewski, "Quaternion Feistel Cipher with an infinite key space based on quaternion Julia sets", Journal of Telecom- munications and information Technology, vol. 4, pp. 15-21, 2015. open in new tab
- Czaplewski B., R. Rykaczewski, "Receiver-side fingerprinting method for color images based on a series of quaternion rotations", przegląd Telekomunikacyjny i wiadomości Telekomunikacyjne / Telecommuni- cation Review + Telecommunication News, vol. 8-9, pp. 1127-1134, 2015. open in new tab
- Czaplewski B.,"Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining", Journal of Visual Communication and image Representation, vol. 40, part A, pp. 1-13, 2016. open in new tab
- Ge H., H. Liu and Z. Jin, key Technical analysis on steganography and steganalysis, 3rd Int. Conf. Multimedia Technology ICMT, 2013.
- Lin J.Q.; S.P. Zhong, JpeG image steganalysis method based on binary similarity measures, Int. Conf. on Machine Learning and Cyber- netics, vol. 4, pp. 2238-2243, 2009.
- Yang G., H. Zhang, Using Higher Order DCT Difference to effective improve Markov process Based JpeG steganalysis Detection Rate, Asia-Pacific Conf. Information Processing, vol. 2, pp. 47-50, 2009.
- Liu S., L. Ma, H. Yao, D. Zhao, Universal steganalysis Based on stati- stical Models Using Reorganization of Block-based DCT Coefficients, 5th Int. Conf. Information Assurance and Security IAS '09, vol. 1, pp. 778-781, 2009. open in new tab
- He Z.M.; W.W.Y. Ng, P.P.K. Chan, D.S. Yeung, steganography detection using localized generalization error model, IEEE Int. Conf. Systems Man and Cybernetics (SMC), pp. 1544-1549, 2010.
- Chen Q., S. Zhong, Universal steganographic Detection algorithmin in JpeG image Using the Data-Dependent kernel, 3th Int. Symposium on Electronic Commerce and Security (ISECS), pp. 232-236, 2010.
- Bhat V.H., S. Krishna, P.D. Shenoy, K.R. Venugopal, L.M. Patnaik, HUBFiRe -a multi-class sVM based JpeG steganalysis using HBCl statistics and Fr index, Int. Conf. Security and Cryptography, pp. 1-6, 2010. open in new tab
- Ping Q., C. Li-ya, W. Meng, a universal steganalysis to steganogra- phic images on frequency domain, Int. Conference E-Business and E -Government (ICEE), pp. 1-5, 2011.
- Anitha P. T., M. Rajaram, S. N. Sivanandham, "Neural Network Based Steganalysis Framework to Detect Stego-Contents in Corporate Ema- ils", international Journal of emerging Technology and advanced engi- neering, vol. 2, issue 3, 2012.
- Geetha S., S.S. Sindhu, N. Ishwarya, A. Mohan, P. Amuthayazhini, N. Kamaraj, intelligent detection of lsB stego anomalies in images using soft computing paradigms; Int. Conf. Methods and Models in Computer Science, pp. 1-5, 2009. open in new tab
- Sun Z., H. Li, Z. Wu, Z. Zhou, an image steganalysis Method Based on Characteristic Function Moments of wavelet subbands, Int. Conf. Artificial Intelligence and Computational Intelligence, vol. 1, pp. 291- 295, 2009. open in new tab
- Yang X., S. Wang, J. Liu, Universal steganalysis to images with wBMC Model, 5 th Int. Conf. Information Assurance and Security, vol. 2, pp 627-630, 2009.
- Ramezani M., S. Ghaemmaghami, Towards Genetic Feature selection in image steganalysis, 7th IEEE Consumer Communications and Networking Conference, pp. 1-4, 2010. open in new tab
- Gireesh Kumar T., R. Jithin, D.D. Shankar, Int.Conf. Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics Advances in Computer Engineering, pp. 298-300.
- Li H.; Z. Sun, Z. Zhou, an image steganalysis method based on charac- teristic function moments and pCa, 30th Chinese Control Conference (CCC), pp. 3005-3008, 2011.
- Yang X., Y. Lei, X. Pan, J. Liu, Universal image steganalysis Based on wavelet packet Decomposition and empirical Transition Matrix in wavelet Domain; Int. Forum on Computer Science, Technology and Applications IFCSTA '09, vol. 2 pp. 179-182, 2009.
- He F., S. Zhong, K. Chen. "An Effective Ensemble-based Classification Algorithm for High-Dimensional Steganalysis", Journal of software, vol. 9, no. 7, 2014. Portal Informacji Technicznej www.sigma-not.pl największa baza publikacji technicznych on-line open in new tab
- Verified by:
- Gdańsk University of Technology
seen 125 times