Chandu et al., 2022 - Google Patents
Countering steganographic security with CNNChandu et al., 2022
- Document ID
- 12700640125849160784
- Author
- Chandu N
- Subramanian N
- Publication year
- Publication venue
- 2022 10th International Symposium on Digital Forensics and Security (ISDFS)
External Links
Snippet
Accurate steganalysis is required for extracting secret data hidden using different steganographic techniques. A steganalysis technique using the" Yedroudj" network is proposed in this work. The common steganalysis process is followed using highlight …
- 238000000034 method 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fridrich et al. | Detecting LSB steganography in color, and gray-scale images | |
Nawaz et al. | Advance hybrid medical watermarking algorithm using speeded up robust features and discrete cosine transform | |
Fridrich et al. | Forensic steganalysis: determining the stego key in spatial domain steganography | |
CN115378574A (en) | A lightweight dynamic image data encryption method and system | |
Vijjapu et al. | Steganalysis using convolutional neural networks-yedroudj net | |
Yang et al. | A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security | |
Biswas et al. | Coverless image steganography based on DWT approximation and pixel intensity averaging | |
Chandu et al. | Countering steganographic security with CNN | |
Shankara et al. | Blind steganalysis for JPEG images using SVM and SVM-PSO classifiers | |
Sun et al. | DetectBERT: Towards full app-level representation learning to detect android malware | |
RU2351013C2 (en) | Watermark detection | |
Deepa et al. | Steganalysis on images based on the classification of image feature sets using SVM classifier | |
Demircan et al. | A Novel LSB Steganography Technique Using Image Segmentation. | |
Taneja et al. | A bit-plane slicing technique for the classification of anti-forensically contrast-enhanced images | |
Wu | Efficient reversible data hiding simultaneously exploiting adjacent pixels | |
Savakar et al. | Copy-move image forgery detection using shannon entropy | |
Kumaki et al. | Morphological pattern spectrum and block cipher processing based image-manipulation detection | |
Taj et al. | Reversible watermarking method with low distortion for the secure transmission of medical images | |
Malik | Steganalysis of qim steganography using irregularity measure | |
Ito et al. | Access control of semantic segmentation models using encrypted feature maps | |
Rashid et al. | Topological data analysis as image steganalysis technique | |
Adhav et al. | Tackling the emerging threat of image-based steganographic malware with advanced machine learning techniques | |
Kulkarni et al. | Source camera identification using GLCM | |
Singh et al. | Perceptual Hashing Algorithms for Image Recognition | |
Erukude | Identifying Bias in CNN Image Classification Using Image Scrambling and Transforms |