2005
DOI: 10.1007/11558859_20
|View full text |Cite
|
Sign up to set email alerts
|

Steganalysis Based on Multiple Features Formed by Statistical Moments of Wavelet Characteristic Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
96
0
1

Year Published

2006
2006
2012
2012

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 126 publications
(101 citation statements)
references
References 10 publications
0
96
0
1
Order By: Relevance
“…5. Xuan-39: Spatial domain steganalysis proposed by Xuan et al [13] (a 39-dimensional feature vector). 6.…”
Section: Detection Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…5. Xuan-39: Spatial domain steganalysis proposed by Xuan et al [13] (a 39-dimensional feature vector). 6.…”
Section: Detection Resultsmentioning
confidence: 99%
“…It is known that, the higher order statistics, in general, are difficult to match, model, or restore. Recently, blind steganalysis algorithms [9][10][11][12][13][14][15][16] have been proposed that employ supervised learning to distinguish between the plain cover and stego images, and also identify the particular hiding algorithm used for steganography. These techniques bank on the fact that there are some image features that are modified during the embedding process which can be used as an input to the learning machine.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Such a phenomenon usually do not appear in natural images, therefore its appearance would attract the steganalyst's attention. This is why histogram and histogram characteristic functions have been extensively used in measuring the security of stegonagraphic schemes [18][19][20]. By analysing the histogram of the stego-image, the attacker can easily detect the spheres in the form of aggregated clusters separated by large gaps in the histogram.…”
Section: Histogram Analysis and ε-Securementioning
confidence: 99%
“…There are two major classes of steganalytic methods-targeted attacks and blind steganalysis. Targeted attacks use the knowledge of the embedding algorithm [11], while blind approaches are not tailored to any specific embedding paradigm [9,8,4,5,21,28,15]. Blind approaches can be thought of as practical embodiments of Cachin's [6] definition of steganographic security.…”
Section: Introductionmentioning
confidence: 99%