Large-scale steganalysis using outlier detection method for image sharing application

N. Das, P. Rasmi
{"title":"Large-scale steganalysis using outlier detection method for image sharing application","authors":"N. Das, P. Rasmi","doi":"10.1109/ICCPCT.2015.7159320","DOIUrl":null,"url":null,"abstract":"In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPCT.2015.7159320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.
利用离群点检测方法进行大规模隐写分析的图像共享应用
在过去的几年中,出现了许多隐写分析技术,但它们都不能有效地用于传输数百万图像的真实世界图像共享应用。在小规模隐写分析中,单个图像被检测出可疑的有效载荷。这里使用一种不同的方法来确定在网络中发送大量秘密数据的最多产的隐写者。介绍了一种从大量用户中确定隐写者的新技术,其中每个用户传输大量图像。该方法从图像中提取隐写特征,计算用户之间的距离,找出偏离大多数用户的离群用户。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信