{"title":"Large-scale steganalysis using outlier detection method for image sharing application","authors":"N. Das, P. Rasmi","doi":"10.1109/ICCPCT.2015.7159320","DOIUrl":null,"url":null,"abstract":"In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":"40 1","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPCT.2015.7159320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.