2019
DOI: 10.32604/cmc.2019.06154
|View full text |Cite
|
Sign up to set email alerts
|

Locating Steganalysis of LSB Matching Based on Spatial and Wavelet Filter Fusion

Abstract: For the case of that only a single stego image of LSB (Least Significant Bit) matching steganography is available, the existing steganalysis algorithms cannot effectively locate the modified pixels. Therefore, an algorithm is proposed to locate the modified pixels of LSB matching based on spatial and wavelet filter fusion. Firstly, the validity of using the residuals obtained by spatial and wavelet filtering to locate the modified pixels of LSB matching is analyzed. It is pointed out that both of these two kin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
(27 reference statements)
0
4
0
Order By: Relevance
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…Although Quach [17] has proved the locatability of modified pixels in a single stego image, the actual steganography payload algorithms designed for a single stego image can only locate the steganography payload with low accuracy because it is very difficult to precisely estimate the cover of the given stego image and about half of the stego elements are still unchanged [18]. However, for the convenience of communication, many communication participants use the same key in a certain period of time and limit the embedding ratio.…”
Section: Introductionmentioning
confidence: 99%
“…Usually, this task is formulated as a binary classification problem to distinguish between cover images and stego images. Compare with tradition SRM (Spatial Rich Model) [13], several deep learning steganalysis methods [14][15][16][17][18][19] have been proposed to solve the steganalysis problem which improves detection accuracy to a new level.…”
Section: Introductionmentioning
confidence: 99%