Essays about: "steganalysis"

Found 5 essays containing the word steganalysis.

  1. 1. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE

  2. 2. Text Steganalysis based on Convolutional Neural Networks

    University essay from Blekinge Tekniska Högskola

    Author : Tejasvi Akula; Varshitha Pamisetty; [2022]
    Keywords : CNN; text steganalysis; Deep Learning; Decision Strategy;

    Abstract : The CNN-based steganalysis model is able to capture some complex statistical dependencies and also learn feature representations. The proposed model uses a word embedding layer to map the words into dense vectors thus, achieving more accurate representations of the words. The proposed model extracts both, the syntax and semantic features. READ MORE

  3. 3. A study in how to inject steganographic data into videos in a sturdy and non-intrusive manner

    University essay from KTH/Hälsoinformatik och logistik

    Author : Julius Andersson; David Engström; [2019]
    Keywords : Steganography; Steganalysis; Watermarking; Information hiding; Cryptography; Compression; Non-intrusive; Sturdy; JPEG; Steganografi; Steganalys; Vattenmärkning; Kryptografi; Kompression; Icke störande; Stabil; JPEG;

    Abstract : It is desirable for companies to be able to hide data inside videos to be able to find the source of any unauthorised sharing of a video. The hidden data (the payload) should damage the original data (the cover) by an as small amount as possible while also making it hard to remove the payload without also severely damaging the cover. READ MORE

  4. 4. Blind Image Steganalytic Optimization by using Machine Learning

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Despoina Giarimpampa; [2018]
    Keywords : steganography; steganalysis; machine learning; stelanology;

    Abstract : Since antiquity, steganography has existed in protecting sensitive information against unauthorized unveiling attempts. Nevertheless, digital media’s evolution, reveals that steganography has been used as a tool for activities such as terrorism or child pornography. Given this background, steganalysis arises as an antidote to steganography. READ MORE

  5. 5. Steganographic embedding and steganalysisevaluation : An evaluation of common methods for steganographic embedding and analysis indigital images.

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : SIMON JOHANSSON; EMIL LENNGREN; [2014]
    Keywords : ;

    Abstract : Steganography is the technique that hides secret messages in seemingly inoccuous data. Steganalysis is the technique that is used to discover the use of steganography. Usuallyit is difficult to extract the exact hidden message because itis usually encrypted. READ MORE