Essays about: "Steganalysis"

Found 3 essays containing the word Steganalysis.

  1. 1. A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner

    University essay from KTH/Hälsoinformatik och logistik; KTH/Hälsoinformatik och logistik

    Author : Julius Andersson; David Engström; [2019]
    Keywords : Steganography; Steganalysis; Watermarking; Information hiding; Cryptography; Compression; Non-intrusive; Sturdy; JPEG; Steganografi; Steganalys; Vattenmärkning; Kryptografi; Kompression; Icke störande; Stabil; JPEG;

    Abstract : It is desirable for companies to be able to hide data inside videos to be able to find the source of any unauthorised sharing of a video. The hidden data (the payload) should damage the original data (the cover) by an as small amount as possible while also making it hard to remove the payload without also severely damaging the cover. READ MORE

  2. 2. Blind Image Steganalytic Optimization by using Machine Learning

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Despoina Giarimpampa; [2018]
    Keywords : steganography; steganalysis; machine learning; stelanology;

    Abstract : Since antiquity, steganography has existed in protecting sensitive information against unauthorized unveiling attempts. Nevertheless, digital media’s evolution, reveals that steganography has been used as a tool for activities such as terrorism or child pornography. Given this background, steganalysis arises as an antidote to steganography. READ MORE

  3. 3. Steganographic embedding and steganalysisevaluation : An evaluation of common methods for steganographic embedding and analysis indigital images.

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC); KTH/Skolan för datavetenskap och kommunikation (CSC)

    Keywords : ;

    Abstract : Steganography is the technique that hides secret messages in seemingly inoccuous data. Steganalysis is the technique that is used to discover the use of steganography. Usuallyit is difficult to extract the exact hidden message because itis usually encrypted. READ MORE