Steganalysis for clustering modification directions steganography
Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper ov...
Ausführliche Beschreibung
Autor*in: |
Rawat, Ritvik [verfasserIn] |
---|
Format: |
Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science+Business Media, LLC, part of Springer Nature 2019 |
---|
Übergeordnetes Werk: |
Enthalten in: Multimedia tools and applications - Springer US, 1995, 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 |
---|---|
Übergeordnetes Werk: |
volume:79 ; year:2019 ; number:3-4 ; day:14 ; month:11 ; pages:1971-1986 |
Links: |
---|
DOI / URN: |
10.1007/s11042-019-08263-z |
---|
Katalog-ID: |
OLC2035073634 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | OLC2035073634 | ||
003 | DE-627 | ||
005 | 20230503193820.0 | ||
007 | tu | ||
008 | 200819s2019 xx ||||| 00| ||eng c | ||
024 | 7 | |a 10.1007/s11042-019-08263-z |2 doi | |
035 | |a (DE-627)OLC2035073634 | ||
035 | |a (DE-He213)s11042-019-08263-z-p | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | 4 | |a 070 |a 004 |q VZ |
100 | 1 | |a Rawat, Ritvik |e verfasserin |4 aut | |
245 | 1 | 0 | |a Steganalysis for clustering modification directions steganography |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a ohne Hilfsmittel zu benutzen |b n |2 rdamedia | ||
338 | |a Band |b nc |2 rdacarrier | ||
500 | |a © Springer Science+Business Media, LLC, part of Springer Nature 2019 | ||
520 | |a Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. | ||
650 | 4 | |a Steganalysis | |
650 | 4 | |a Spatial domain steganalysis | |
650 | 4 | |a CMD steganography | |
700 | 1 | |a Singh, Brijesh |0 (orcid)0000-0003-2661-6244 |4 aut | |
700 | 1 | |a Sur, Arijit |4 aut | |
700 | 1 | |a Mitra, Pinaki |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Multimedia tools and applications |d Springer US, 1995 |g 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 |w (DE-627)189064145 |w (DE-600)1287642-2 |w (DE-576)052842126 |x 1380-7501 |7 nnns |
773 | 1 | 8 | |g volume:79 |g year:2019 |g number:3-4 |g day:14 |g month:11 |g pages:1971-1986 |
856 | 4 | 1 | |u https://doi.org/10.1007/s11042-019-08263-z |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_OLC | ||
912 | |a SSG-OLC-MAT | ||
912 | |a SSG-OLC-BUB | ||
912 | |a SSG-OLC-MKW | ||
912 | |a GBV_ILN_70 | ||
951 | |a AR | ||
952 | |d 79 |j 2019 |e 3-4 |b 14 |c 11 |h 1971-1986 |
author_variant |
r r rr b s bs a s as p m pm |
---|---|
matchkey_str |
article:13807501:2019----::tgnlssocutrnmdfctodrci |
hierarchy_sort_str |
2019 |
publishDate |
2019 |
allfields |
10.1007/s11042-019-08263-z doi (DE-627)OLC2035073634 (DE-He213)s11042-019-08263-z-p DE-627 ger DE-627 rakwb eng 070 004 VZ Rawat, Ritvik verfasserin aut Steganalysis for clustering modification directions steganography 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. Steganalysis Spatial domain steganalysis CMD steganography Singh, Brijesh (orcid)0000-0003-2661-6244 aut Sur, Arijit aut Mitra, Pinaki aut Enthalten in Multimedia tools and applications Springer US, 1995 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:79 year:2019 number:3-4 day:14 month:11 pages:1971-1986 https://doi.org/10.1007/s11042-019-08263-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 79 2019 3-4 14 11 1971-1986 |
spelling |
10.1007/s11042-019-08263-z doi (DE-627)OLC2035073634 (DE-He213)s11042-019-08263-z-p DE-627 ger DE-627 rakwb eng 070 004 VZ Rawat, Ritvik verfasserin aut Steganalysis for clustering modification directions steganography 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. Steganalysis Spatial domain steganalysis CMD steganography Singh, Brijesh (orcid)0000-0003-2661-6244 aut Sur, Arijit aut Mitra, Pinaki aut Enthalten in Multimedia tools and applications Springer US, 1995 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:79 year:2019 number:3-4 day:14 month:11 pages:1971-1986 https://doi.org/10.1007/s11042-019-08263-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 79 2019 3-4 14 11 1971-1986 |
allfields_unstemmed |
10.1007/s11042-019-08263-z doi (DE-627)OLC2035073634 (DE-He213)s11042-019-08263-z-p DE-627 ger DE-627 rakwb eng 070 004 VZ Rawat, Ritvik verfasserin aut Steganalysis for clustering modification directions steganography 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. Steganalysis Spatial domain steganalysis CMD steganography Singh, Brijesh (orcid)0000-0003-2661-6244 aut Sur, Arijit aut Mitra, Pinaki aut Enthalten in Multimedia tools and applications Springer US, 1995 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:79 year:2019 number:3-4 day:14 month:11 pages:1971-1986 https://doi.org/10.1007/s11042-019-08263-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 79 2019 3-4 14 11 1971-1986 |
allfieldsGer |
10.1007/s11042-019-08263-z doi (DE-627)OLC2035073634 (DE-He213)s11042-019-08263-z-p DE-627 ger DE-627 rakwb eng 070 004 VZ Rawat, Ritvik verfasserin aut Steganalysis for clustering modification directions steganography 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. Steganalysis Spatial domain steganalysis CMD steganography Singh, Brijesh (orcid)0000-0003-2661-6244 aut Sur, Arijit aut Mitra, Pinaki aut Enthalten in Multimedia tools and applications Springer US, 1995 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:79 year:2019 number:3-4 day:14 month:11 pages:1971-1986 https://doi.org/10.1007/s11042-019-08263-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 79 2019 3-4 14 11 1971-1986 |
allfieldsSound |
10.1007/s11042-019-08263-z doi (DE-627)OLC2035073634 (DE-He213)s11042-019-08263-z-p DE-627 ger DE-627 rakwb eng 070 004 VZ Rawat, Ritvik verfasserin aut Steganalysis for clustering modification directions steganography 2019 Text txt rdacontent ohne Hilfsmittel zu benutzen n rdamedia Band nc rdacarrier © Springer Science+Business Media, LLC, part of Springer Nature 2019 Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. Steganalysis Spatial domain steganalysis CMD steganography Singh, Brijesh (orcid)0000-0003-2661-6244 aut Sur, Arijit aut Mitra, Pinaki aut Enthalten in Multimedia tools and applications Springer US, 1995 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 (DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 1380-7501 nnns volume:79 year:2019 number:3-4 day:14 month:11 pages:1971-1986 https://doi.org/10.1007/s11042-019-08263-z lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 AR 79 2019 3-4 14 11 1971-1986 |
language |
English |
source |
Enthalten in Multimedia tools and applications 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 volume:79 year:2019 number:3-4 day:14 month:11 pages:1971-1986 |
sourceStr |
Enthalten in Multimedia tools and applications 79(2019), 3-4 vom: 14. Nov., Seite 1971-1986 volume:79 year:2019 number:3-4 day:14 month:11 pages:1971-1986 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Steganalysis Spatial domain steganalysis CMD steganography |
dewey-raw |
070 |
isfreeaccess_bool |
false |
container_title |
Multimedia tools and applications |
authorswithroles_txt_mv |
Rawat, Ritvik @@aut@@ Singh, Brijesh @@aut@@ Sur, Arijit @@aut@@ Mitra, Pinaki @@aut@@ |
publishDateDaySort_date |
2019-11-14T00:00:00Z |
hierarchy_top_id |
189064145 |
dewey-sort |
270 |
id |
OLC2035073634 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035073634</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193820.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2019 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-019-08263-z</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035073634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-019-08263-z-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rawat, Ritvik</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Steganalysis for clustering modification directions steganography</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC, part of Springer Nature 2019</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Steganalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spatial domain steganalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CMD steganography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Brijesh</subfield><subfield code="0">(orcid)0000-0003-2661-6244</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sur, Arijit</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mitra, Pinaki</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">79(2019), 3-4 vom: 14. Nov., Seite 1971-1986</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:79</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:3-4</subfield><subfield code="g">day:14</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:1971-1986</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-019-08263-z</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">79</subfield><subfield code="j">2019</subfield><subfield code="e">3-4</subfield><subfield code="b">14</subfield><subfield code="c">11</subfield><subfield code="h">1971-1986</subfield></datafield></record></collection>
|
author |
Rawat, Ritvik |
spellingShingle |
Rawat, Ritvik ddc 070 misc Steganalysis misc Spatial domain steganalysis misc CMD steganography Steganalysis for clustering modification directions steganography |
authorStr |
Rawat, Ritvik |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)189064145 |
format |
Article |
dewey-ones |
070 - News media, journalism & publishing 004 - Data processing & computer science |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
OLC |
remote_str |
false |
illustrated |
Not Illustrated |
issn |
1380-7501 |
topic_title |
070 004 VZ Steganalysis for clustering modification directions steganography Steganalysis Spatial domain steganalysis CMD steganography |
topic |
ddc 070 misc Steganalysis misc Spatial domain steganalysis misc CMD steganography |
topic_unstemmed |
ddc 070 misc Steganalysis misc Spatial domain steganalysis misc CMD steganography |
topic_browse |
ddc 070 misc Steganalysis misc Spatial domain steganalysis misc CMD steganography |
format_facet |
Aufsätze Gedruckte Aufsätze |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
nc |
hierarchy_parent_title |
Multimedia tools and applications |
hierarchy_parent_id |
189064145 |
dewey-tens |
070 - News media, journalism & publishing 000 - Computer science, knowledge & systems |
hierarchy_top_title |
Multimedia tools and applications |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)189064145 (DE-600)1287642-2 (DE-576)052842126 |
title |
Steganalysis for clustering modification directions steganography |
ctrlnum |
(DE-627)OLC2035073634 (DE-He213)s11042-019-08263-z-p |
title_full |
Steganalysis for clustering modification directions steganography |
author_sort |
Rawat, Ritvik |
journal |
Multimedia tools and applications |
journalStr |
Multimedia tools and applications |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
000 - Computer science, information & general works |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
container_start_page |
1971 |
author_browse |
Rawat, Ritvik Singh, Brijesh Sur, Arijit Mitra, Pinaki |
container_volume |
79 |
class |
070 004 VZ |
format_se |
Aufsätze |
author-letter |
Rawat, Ritvik |
doi_str_mv |
10.1007/s11042-019-08263-z |
normlink |
(ORCID)0000-0003-2661-6244 |
normlink_prefix_str_mv |
(orcid)0000-0003-2661-6244 |
dewey-full |
070 004 |
title_sort |
steganalysis for clustering modification directions steganography |
title_auth |
Steganalysis for clustering modification directions steganography |
abstract |
Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. © Springer Science+Business Media, LLC, part of Springer Nature 2019 |
abstractGer |
Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. © Springer Science+Business Media, LLC, part of Springer Nature 2019 |
abstract_unstemmed |
Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy. © Springer Science+Business Media, LLC, part of Springer Nature 2019 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_OLC SSG-OLC-MAT SSG-OLC-BUB SSG-OLC-MKW GBV_ILN_70 |
container_issue |
3-4 |
title_short |
Steganalysis for clustering modification directions steganography |
url |
https://doi.org/10.1007/s11042-019-08263-z |
remote_bool |
false |
author2 |
Singh, Brijesh Sur, Arijit Mitra, Pinaki |
author2Str |
Singh, Brijesh Sur, Arijit Mitra, Pinaki |
ppnlink |
189064145 |
mediatype_str_mv |
n |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s11042-019-08263-z |
up_date |
2024-07-03T23:42:29.982Z |
_version_ |
1803603306072768512 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">OLC2035073634</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503193820.0</controlfield><controlfield tag="007">tu</controlfield><controlfield tag="008">200819s2019 xx ||||| 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s11042-019-08263-z</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)OLC2035073634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-He213)s11042-019-08263-z-p</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">070</subfield><subfield code="a">004</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rawat, Ritvik</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Steganalysis for clustering modification directions steganography</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">ohne Hilfsmittel zu benutzen</subfield><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Band</subfield><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science+Business Media, LLC, part of Springer Nature 2019</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract In recent time, most of the steganographic methods minimize the embedding cost while maximizing the embedding capacity by injecting message bits in the highly textured regions of the image. Recently, the Clustering Modification Direction (CMD) steganography has been proposed as a wrapper over the additive steganography algorithms, resulting in a substantial improvement in statistical imperceptibility against state-of-the-art steganalytic classifiers. In this paper, a steganalysis scheme, named Selective-Signal-Removal (SSR) is proposed to mount an attack on the CMD algorithm. It has been observed experimentally that the CMD scheme has a tendency to embed in a localized cluster having higher texture. The proposed scheme exploits this fact and tries to predict the embedding zones. It essentially discards the irrelevant region of the image (which may not be modified by the CMD algorithm while embedding) by using a heuristic function with an assignment algorithm to improve the steganalytic detection rate. The experimental results show that the proposed SSR scheme can detect CMD based steganography with improved accuracy.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Steganalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spatial domain steganalysis</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CMD steganography</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Brijesh</subfield><subfield code="0">(orcid)0000-0003-2661-6244</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sur, Arijit</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mitra, Pinaki</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Multimedia tools and applications</subfield><subfield code="d">Springer US, 1995</subfield><subfield code="g">79(2019), 3-4 vom: 14. Nov., Seite 1971-1986</subfield><subfield code="w">(DE-627)189064145</subfield><subfield code="w">(DE-600)1287642-2</subfield><subfield code="w">(DE-576)052842126</subfield><subfield code="x">1380-7501</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:79</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:3-4</subfield><subfield code="g">day:14</subfield><subfield code="g">month:11</subfield><subfield code="g">pages:1971-1986</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.1007/s11042-019-08263-z</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_OLC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MAT</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-BUB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-MKW</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">79</subfield><subfield code="j">2019</subfield><subfield code="e">3-4</subfield><subfield code="b">14</subfield><subfield code="c">11</subfield><subfield code="h">1971-1986</subfield></datafield></record></collection>
|
score |
7.397834 |