2017 IEEE International Conference on Multimedia and Expo (ICME) 2017
DOI: 10.1109/icme.2017.8019320
|View full text |Cite
|
Sign up to set email alerts
|

Steganographer detection via deep residual network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…More generally, we hope that this research will stimulate practical approaches to detecting a steganographer amongst multiple actors. This is an area which has relatively little attention [12,15], compared with binary detection applied to a single image. Just as the single-actor, single-image Square-Root Law -a theoretical result about unrealistic probabilistic models -has been observed robustly in genuine image steganography [7], we predict that a welldesigned steganographer detector should exhibit the O( log K) law derived here.…”
Section: Discussionmentioning
confidence: 99%
“…Proposed network can obtain remarkable performance boost compared to DCTR [39], but still inferior to PHARM. In the same year Xu et al [21], construct a deep learning neural network with 20-layers for JPEG steganalysis, strongly inspired by Res-Net [52] with shortcut connection tricks [21]. Proposed network replaced pooling layers with convolutional layers also improved the result in terms of accuracy.…”
Section: Jpeg Image Steganalysismentioning
confidence: 99%