Sciweavers

2474 search results - page 8 / 495
» Attacks on Steganographic Systems
Sort
View
ICIP
2007
IEEE
15 years 6 months ago
Steganalyzing Texture Images
A texture image is of noisy nature in its spatial representation. As a result, the data hidden in texture images, in particular in raw texture images, are hard to detect with curr...
Chunhua Chen, Yun Q. Shi, Guorong Xuan
MEDIAFORENSICS
2010
15 years 1 months ago
Modern steganalysis can detect YASS
YASS is a steganographic algorithm for digital images that hides messages robustly in a key-dependent transform domain so that the stego image can be subsequently compressed and d...
Jan Kodovský, Tomás Pevný, Je...
HICSS
2003
IEEE
130views Biometrics» more  HICSS 2003»
15 years 5 months ago
Attack Recognition for System Survivability: A Low-level Approach
This paper extends and builds on previous work that presented a signature-based attack recognition technique. We present general requirements for “survivable attack recognitionâ...
Carol Taylor, Jim Alves-Foss
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 7 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
IWDW
2007
Springer
15 years 5 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su