All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Using Set Covering to Generate Databases for Holistic Steganalysis

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F22%3A00364282" target="_blank" >RIV/68407700:21230/22:00364282 - isvavai.cz</a>

  • Result on the web

    <a href="https://doi.org/10.1109/WIFS55849.2022.9975430" target="_blank" >https://doi.org/10.1109/WIFS55849.2022.9975430</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1109/WIFS55849.2022.9975430" target="_blank" >10.1109/WIFS55849.2022.9975430</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Using Set Covering to Generate Databases for Holistic Steganalysis

  • Original language description

    Within an operational framework, covers used by a steganographer are likely to come from different sensors and different processing pipelines than the ones used by researchers for training their steganalysis models. Thus, a performance gap is unavoidable when it comes to out-of-distributions covers, an extremely frequent scenario called Cover Source Mismatch (CSM). Here, we explore a grid of processing pipelines to study the origins of CSM, to better understand it, and to better tackle it. A set-covering greedy algorithm is used to select representative pipelines minimizing the maximum regret between the representative and the pipelines within the set. Our main contribution is a methodology for generating relevant bases able to tackle operational CSM. Experimental validation highlights that, for a given number of training samples, our set covering selection is a better strategy than selecting random pipelines or using all the available pipelines. Our analysis also shows that parameters as denoising, sharpening, and downsampling are very important to foster diversity. Finally, different benchmarks for classical and wild databases show the good generalization property of the extracted databases.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    R - Projekt Ramcoveho programu EK

Others

  • Publication year

    2022

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    IEEE International Workshop on Information Forensics and Security

  • ISBN

    979-8-3503-0967-6

  • ISSN

    2157-4766

  • e-ISSN

  • Number of pages

    6

  • Pages from-to

  • Publisher name

    Institute of Electrical and Electronics Engineers, Inc.

  • Place of publication

  • Event location

    Online

  • Event date

    Dec 12, 2022

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000907044000021