This paper proposes an improved steganalytic method when cover selection is used in steganography. We observed that the covers selected by existing cover selection methods normally have different characteristics from normal ones, and propose a steganalytic method to capture such differences. As a result, the detection accuracy of steganalysis is increased. In our method, we consider a number of images collected from one or more target (suspected but not known) users, and use an unsupervised learning algorithm such as $k$ -means to adapt the performance of a pre-trained classifier towards the cover selection operation of the target user(s). The adaptation is done via pseudo-labels from the suspected images themselves, thus allowing the re-tr...
International audienceFrom the perspective of signal detection theory, it seems obvious that knowing...
International audienceIt is now well known that practical steganalysis using machine learning techni...
Recent research has demonstrated the effectiveness of utilizing neural networks for detect tampering...
This paper introduces a novel method for extracting sets of feature from 3D objects characterising a...
While 3-D steganography and digital watermarking represent methods for embedding information into 3-...
In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting ...
When a steganalysis detector trained on one cover source is applied to images from a different sourc...
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Stegano...
Abstract—Steganography is the method of information hiding. Free selection of cover image is a parti...
Since antiquity, steganography has existed in protecting sensitive information against unauthorized ...
Steganography is the art of covered or hidden writing It is used for criminal activities applicatio...
The security of a steganography system is defined by our ability to detect it. It is of no surprise ...
In this paper, an unsupervised steganalysis method that combines artificial training sets and superv...
xix, 113 pages : color illustrationsPolyU Library Call No.: [THS] LG51 .H577P COMP 2017 WuRecent adv...
Steganography is the art and science of producing covert communications by concealing secret message...
International audienceFrom the perspective of signal detection theory, it seems obvious that knowing...
International audienceIt is now well known that practical steganalysis using machine learning techni...
Recent research has demonstrated the effectiveness of utilizing neural networks for detect tampering...
This paper introduces a novel method for extracting sets of feature from 3D objects characterising a...
While 3-D steganography and digital watermarking represent methods for embedding information into 3-...
In the paper we introduce a new universal steganalytic method in JPEG file format that is detecting ...
When a steganalysis detector trained on one cover source is applied to images from a different sourc...
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Stegano...
Abstract—Steganography is the method of information hiding. Free selection of cover image is a parti...
Since antiquity, steganography has existed in protecting sensitive information against unauthorized ...
Steganography is the art of covered or hidden writing It is used for criminal activities applicatio...
The security of a steganography system is defined by our ability to detect it. It is of no surprise ...
In this paper, an unsupervised steganalysis method that combines artificial training sets and superv...
xix, 113 pages : color illustrationsPolyU Library Call No.: [THS] LG51 .H577P COMP 2017 WuRecent adv...
Steganography is the art and science of producing covert communications by concealing secret message...
International audienceFrom the perspective of signal detection theory, it seems obvious that knowing...
International audienceIt is now well known that practical steganalysis using machine learning techni...
Recent research has demonstrated the effectiveness of utilizing neural networks for detect tampering...