{"title":"利用离群点检测方法进行大规模隐写分析的图像共享应用","authors":"N. Das, P. Rasmi","doi":"10.1109/ICCPCT.2015.7159320","DOIUrl":null,"url":null,"abstract":"In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"40 1","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Large-scale steganalysis using outlier detection method for image sharing application\",\"authors\":\"N. Das, P. Rasmi\",\"doi\":\"10.1109/ICCPCT.2015.7159320\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.\",\"PeriodicalId\":6650,\"journal\":{\"name\":\"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]\",\"volume\":\"40 1\",\"pages\":\"1-4\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCPCT.2015.7159320\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPCT.2015.7159320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Large-scale steganalysis using outlier detection method for image sharing application
In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.