2019
DOI: 10.3934/mbe.2019247
|View full text |Cite
|
Sign up to set email alerts
|

Locating secret messages based on quantitative steganalysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…In 2014, Quach used the residuals to estimate the rough sequence of stego positions when owning enough stego images embedded messages of different sizes along the same path [18]. In 2019, Yang et al proposed a locating methodology based on quantitative steganalysis for this case [19]. Recently, Wang et al proposed a payload locating method based on co-frequency subimage filtering for a category of pseudo-random JPEG image steganography, such as JSteg and F5 steganography [20].…”
Section: Introductionmentioning
confidence: 99%