2010
DOI: 10.1117/1.3463021
|View full text |Cite
|
Sign up to set email alerts
|

Histogram estimation-scheme-based steganalysis defeating the steganography using pixel-value differencing and modulus function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In this paper Jeong-Chun Joo Kyung-Su Kim and Heung-Kyu Lee presented a specific steganalysis method to defeat the modulus Pixel Value Differencing (PVD) steganography [7]. By analyzing the embedding process they provided three blind Support Machines (SMs) for the steganalysis and each are used for checking three different features.…”
Section: Histogram Estimation Scheme For Defeating Pixel Value Differmentioning
confidence: 98%
“…In this paper Jeong-Chun Joo Kyung-Su Kim and Heung-Kyu Lee presented a specific steganalysis method to defeat the modulus Pixel Value Differencing (PVD) steganography [7]. By analyzing the embedding process they provided three blind Support Machines (SMs) for the steganalysis and each are used for checking three different features.…”
Section: Histogram Estimation Scheme For Defeating Pixel Value Differmentioning
confidence: 98%
“…Studies have proposed steganalysis methods based on machine learning and deep learning methods [32,33], but these techniques require considerable computing resources. In a statistical characteristic-based steganalysis, Joo et al [34] used the changes in a pixel difference histogram (PDH) to detect modulus PVD steganography. Zaker et al [35] also used PDH to detect tri-way PVD, and Zhang et al [36] proposed PVD noise steganalysis with weighted stego image (WS) estimators.…”
mentioning
confidence: 99%
“…Subsequently, because the embedding process of MFPVD steganography [26] generates fluctuations and growing abnormalities, the asymmetry on the PDH is created. The steganalysis of MFPVD [26] was proposed by Joo et al [45], which utilizes these features to detect the embedding messages.…”
mentioning
confidence: 99%