Practical Deep Learning Models for QIM-based VoIP Steganalysis
Abstract
References
Index Terms
- Practical Deep Learning Models for QIM-based VoIP Steganalysis
Recommendations
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
An efficient high payload ±1 data embedding scheme
Embedding of confidential data in the least significant bit of an image is still an attractive method of steganography. Utilizing the full capacity of cover images by embedding one bit of data per pixel, using methods such as LSB flipping or LSB ...
Steganalysis of QIM steganography using irregularity measure
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and securityThis paper presents a nonparametric steganalysis technique to attack quantization index modulation (QIM) steganography and JSteg steganographic tool. The proposed scheme is based on the observation that message embedding using QIM introduces local ...
Comments
Information & Contributors
Information
Published In
- General Chairs:
- Jianfei Cai,
- Mohan Kankanhalli,
- Balakrishnan Prabhakaran,
- Susanne Boll,
- Program Chairs:
- Ramanathan Subramanian,
- Liang Zheng,
- Vivek K. Singh,
- Pablo Cesar,
- Lexing Xie,
- Dong Xu
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Funding Sources
- the National Natural Science Foundation of China
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 54Total Downloads
- Downloads (Last 12 months)54
- Downloads (Last 6 weeks)5
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in