All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

The Steganographer is the Outlier: Realistic Large-Scale Steganalysis

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F14%3A00225398" target="_blank" >RIV/68407700:21230/14:00225398 - isvavai.cz</a>

  • Result on the web

    <a href="http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6851179" target="_blank" >http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6851179</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/TIFS.2014.2336380" target="_blank" >10.1109/TIFS.2014.2336380</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    The Steganographer is the Outlier: Realistic Large-Scale Steganalysis

  • Original language description

    We present a method for a completely new kind of steganalysis to determine who, out of a large number of actors each transmitting a large number of objects, is hiding payload inside some of them. It has significant challenges, including unknown embeddingparameters and natural deviation between innocent cover sources, which are usually avoided in steganalysis tested under laboratory conditions. Our method uses standard steganalysis features, the maximum mean discrepancy measure of distance, and ranks the actors by their degree of deviation from the rest: we show that it works reliably, completely unsupervised, when tested against some of the standard steganography methods available to nonexperts. We also determine good parameters for the detector and show that it creates a two-player game between the guilty actor and the steganalyst.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    JC - Computer hardware and software

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/GPP103%2F12%2FP514" target="_blank" >GPP103/12/P514: Real-time detection of anomalous events in a non-stationary environment</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY

  • ISSN

    1556-6013

  • e-ISSN

  • Volume of the periodical

    9

  • Issue of the periodical within the volume

    9

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    12

  • Pages from-to

    1424-1435

  • UT code for WoS article

    000340209000008

  • EID of the result in the Scopus database