利用离群点检测方法进行大规模隐写分析的图像共享应用

N. Das, P. Rasmi
{"title":"利用离群点检测方法进行大规模隐写分析的图像共享应用","authors":"N. Das, P. Rasmi","doi":"10.1109/ICCPCT.2015.7159320","DOIUrl":null,"url":null,"abstract":"In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.","PeriodicalId":6650,"journal":{"name":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Large-scale steganalysis using outlier detection method for image sharing application\",\"authors\":\"N. Das, P. Rasmi\",\"doi\":\"10.1109/ICCPCT.2015.7159320\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.\",\"PeriodicalId\":6650,\"journal\":{\"name\":\"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCPCT.2015.7159320\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015]","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCPCT.2015.7159320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

在过去的几年中,出现了许多隐写分析技术,但它们都不能有效地用于传输数百万图像的真实世界图像共享应用。在小规模隐写分析中,单个图像被检测出可疑的有效载荷。这里使用一种不同的方法来确定在网络中发送大量秘密数据的最多产的隐写者。介绍了一种从大量用户中确定隐写者的新技术,其中每个用户传输大量图像。该方法从图像中提取隐写特征,计算用户之间的距离,找出偏离大多数用户的离群用户。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Large-scale steganalysis using outlier detection method for image sharing application
In past several years so many steganalysis techniques are emerged but none of them are not efficient for real world image sharing applications where millions of images are transmitted. In small scale steganalysis individual images are detected for suspicious payload. Here uses a different approach to determine most prolific steganographer who sends large volume of secret data in the network. A new technique is introduced to determine the steganographer out of large number of users, where each user transmits numerous images. In this method steganalytic features are extracted from image, distance between users are calculated and finding out the outlier user who deviate from the majority of other users.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Named entity recognition approaches: A study applied to English and Hindi language Design of asynchronous NoC using 3-port asynchronous T-routers Large-scale steganalysis using outlier detection method for image sharing application Neural network based SOM for multispectral image segmentation in RGB and HSV color space Kernel weighted FCM based MR image segmentation for brain tumor detection
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1