Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security 2016
DOI: 10.1145/2909827.2930799
|View full text |Cite
|
Sign up to set email alerts
|

Color Image Steganalysis Based On Steerable Gaussian Filters Bank

Abstract: This article deals with color images steganalysis based on machine learning. The proposed approach enriches the features from the Color Rich Model by adding new features obtained by applying steerable Gaussian filters and then computing the co-occurrence of pixel pairs. Adding these new features to those obtained from Color-Rich Models allows us to increase the detectability of hidden messages in color images. The Gaussian filters are angled in different directions to precisely compute the tangent of the gradi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 24 publications
(44 reference statements)
0
25
0
Order By: Relevance
“…We can set the message size P and choose β, and α and γ will be calculated using (2) and (1) respectively. In a more conventional way, we can set the embedding rate α and choose β, and P and γ will be computed using (2) and (1) respectively. If we worked on grayscale images, we would set β = 0 which means P = αN Y .…”
Section: Parametrization Of the Payload Distribution For Yc B C R Commentioning
confidence: 99%
See 2 more Smart Citations
“…We can set the message size P and choose β, and α and γ will be calculated using (2) and (1) respectively. In a more conventional way, we can set the embedding rate α and choose β, and P and γ will be computed using (2) and (1) respectively. If we worked on grayscale images, we would set β = 0 which means P = αN Y .…”
Section: Parametrization Of the Payload Distribution For Yc B C R Commentioning
confidence: 99%
“…More accurately, whenever embedding is realized on color numerical images in the pixel domain (usually for steganalysis purposes), it is most of the time implemented independently on each component [1,4,5] but more advanced schemes use a synchronization strategy to have more coherent embedding changes across the different channels [13]. Popular implementations of color JPEG steganography such as F5 [15] or J-UNIWARD [8] alter DCT coefficients without taking into account their related color channels or the related component statistics.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the steganography's resistance to the 3D steganalysis was not considered in [9]. The existing image steganalytic methodology [14,15] cannot be applied to 3D meshes, because unlike 3D objects, images are represented on regular lattices. The first 3D steganalytic algorithm was proposed in [10].…”
Section: D Steganalysismentioning
confidence: 99%
“…In order to be used by many applications, 3D objects are increasingly transferred shared between users through clouds or mobile media. When compared to the steganalysis research on other media, such as images [15,20,1,30,17], video [24,29] and audio signals [18,19], the steganalysis for 3D objects is much less developed, resulting in a lower likelihood of identifying the information hidden in 3D objects. Many 3D information hiding algorithms have already been proposed [5,3,28,16,2,8,12].…”
Section: Introductionmentioning
confidence: 99%