Guan et al., 2022 - Google Patents
Detecting steganography in JPEG images recompressed with the same quantization matrixGuan et al., 2022
- Document ID
- 11419784866432640943
- Author
- Guan Q
- Chen K
- Chen H
- Zhang W
- Yu N
- Publication year
- Publication venue
- IEEE Transactions on Circuits and Systems for Video Technology
External Links
Snippet
JPEG steganalysis aims to detect stego JPEG images. For some robust steganography methods, in order to enhance stego images' robustness of resisting JPEG recompression from lossy channel such SNS or photo sharing websites, steganographer may intentionally …
- 239000011159 matrix material 0 title abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
- G06F17/141—Discrete Fourier transforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhou et al. | Coverless image steganography using partial-duplicate image retrieval | |
Rustad et al. | Digital image steganography survey and investigation (goal, assessment, method, development, and dataset) | |
Swaminathan et al. | Digital image forensics via intrinsic fingerprints | |
Li et al. | Identification of various image operations using residual-based features | |
CN108961137B (en) | Image steganalysis method and system based on convolutional neural network | |
Kang et al. | Identifying tampered regions using singular value decomposition in digital image forensics | |
Butora et al. | Reverse JPEG compatibility attack | |
Galvan et al. | First quantization matrix estimation from double compressed JPEG images | |
Guan et al. | Detecting steganography in JPEG images recompressed with the same quantization matrix | |
Muralidharan et al. | The infinite race between steganography and steganalysis in images | |
Ulutas et al. | A new copy move forgery detection method resistant to object removal with uniform background forgery | |
Bondi et al. | Improving PRNU compression through preprocessing, quantization, and coding | |
Gupta et al. | A study on source device attribution using still images | |
Jalali et al. | A new steganography algorithm based on video sparse representation | |
Cogranne et al. | Application of hypothesis testing theory for optimal detection of LSB matching data hiding | |
Niu et al. | Detection of double JPEG compression with the same quantization matrix via convergence analysis | |
Zhou et al. | Geometric correction code‐based robust image watermarking | |
Bi et al. | Multi-task wavelet corrected network for image splicing forgery detection and localization | |
Biswas et al. | Coverless image steganography based on DWT approximation and pixel intensity averaging | |
Lu et al. | Importance of truncation activation in pre-processing for spatial and jpeg image steganalysis | |
Liu et al. | Efficient binary image steganalysis based on ensemble neural network of multi-module | |
Chen et al. | Reference channels for steganalysis of images with convolutional neural networks | |
CN108021927A (en) | A kind of method for extracting video fingerprints based on slow change visual signature | |
Zeng et al. | Towards Secure and Robust Steganography for Black-box Generated Images | |
CN116402668A (en) | Image processing method and device |