2020
DOI: 10.1007/978-981-15-5243-4_25
|View full text |Cite
|
Sign up to set email alerts
|

Small Embed Cross-validated JPEG Steganalysis in Spatial and Transform Domain Using SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The F5 uses matrixembedding coding which decreases the number of embedding changes, especially for smaller payloads. The working of F5 is as follows 64 .…”
Section: Least Significant Bit Replacement (Lsb Replacement)mentioning
confidence: 99%
“…The F5 uses matrixembedding coding which decreases the number of embedding changes, especially for smaller payloads. The working of F5 is as follows 64 .…”
Section: Least Significant Bit Replacement (Lsb Replacement)mentioning
confidence: 99%
“…Then, the optimal features from each cluster were chosen for a final decision aimed at improving the overall performance of the steganalysis. Shankar and Azhakath [108] explored four feature extractions for the steganalysis, which were first order, extended DCT, second order, and Markov features. They used the LSBM method [73] and F5 [70] for the spatial domain and transform domain, respectively.…”
Section: ) Transform Domain Steganalysismentioning
confidence: 99%
“…Transform and Spatial J-UNIWARD [29], UED [37] , nsf5 [66], S-UNIWARD [29], and MiPOD [32] BOSSbase 1.01 Shankar et al [108] The four extracted features are: first order, extended DCT, second order, and Markov features. Six different kernels and four kinds of samplings of SVM are used for classification.…”
Section: Transformmentioning
confidence: 99%