Comparison of computational complexity of neural network models for detection of steganographic algorithms
Abstract
References
Index Terms
- Comparison of computational complexity of neural network models for detection of steganographic algorithms
Recommendations
LSB steganographic method based on reversible histogram transformation function for resisting statistical steganalysis
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit)...
Improving security of pixel value differencing steganographic method
NTMS'09: Proceedings of the 3rd international conference on New technologies, mobility and securityPixel value differencing (PVD) is a steganographic method which embeds secret data in images based on spatial information. PVD has relatively high capacity but its effectiveness has been questioned by variety of steganalysis attacks. These attacks use ...
Detection Of URL In Image Steganography
ICC '16: Proceedings of the International Conference on Internet of things and Cloud ComputingSteganography is the science of hiding data within data. Either for the good purpose of secret communication or for the bad intention of leaking sensitive confidential data or embedding malicious code or URL. However, many different carrier file formats ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 92Total Downloads
- Downloads (Last 12 months)92
- Downloads (Last 6 weeks)26
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML FormatLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in