Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

PixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation

Full metadata record
DC Field Value Language
dc.contributor.authorJung, Dahuin-
dc.contributor.authorBae, Ho-
dc.contributor.authorChoi, Hyun-Soo-
dc.contributor.authorYoon, Sungroh-
dc.date.accessioned2024-04-08T12:30:30Z-
dc.date.available2024-04-08T12:30:30Z-
dc.date.issued2023-01-
dc.identifier.issn1545-5971-
dc.identifier.issn1941-0018-
dc.identifier.urihttps://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/49443-
dc.description.abstractRecently, the field of steganography has experienced rapid developments based on deep learning (DL). DL based steganography distributes secret information over all the available bits of the cover image, thereby posing difficulties in using conventional steganalysis methods to detect, extractor remove hidden secret images. However, our proposed framework is the first to effectively disable covert communications and transactions that use DL based steganography. We propose a DL based steganalysis technique that effectively removes secret images by restoring the distribution of the original images. We formulate a problem and address it by exploiting sophisticated pixel distributions and an edge distribution of images by using a deep neural network. Based on the given information, we remove the hidden secret information at the pixel level. We evaluate our technique by comparing it with conventional steganalysis methods using three public benchmarks. As the decoding method of DL based steganography is approximate (lossy) and is different from the decoding method of conventional steganography, we also introduce a new quantitative metric called the destruction rate (DT). The experimental results demonstrate performance improvements of 10-20% in both the decoded rate and the DT.-
dc.format.extent12-
dc.language영어-
dc.language.isoENG-
dc.publisherIEEE COMPUTER SOC-
dc.titlePixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation-
dc.typeArticle-
dc.identifier.doi10.1109/TDSC.2021.3132987-
dc.identifier.bibliographicCitationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.20, no.1, pp 331 - 342-
dc.identifier.wosid000965499200001-
dc.identifier.scopusid2-s2.0-85121345164-
dc.citation.endPage342-
dc.citation.number1-
dc.citation.startPage331-
dc.citation.titleIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING-
dc.citation.volume20-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/9640563-
dc.publisher.location미국-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.subject.keywordAuthorImage steganalysis-
dc.subject.keywordAuthoractive steganalysis-
dc.subject.keywordAuthoractive warden-
dc.subject.keywordAuthorpixel distribution-
dc.subject.keywordAuthorimage steganography-
dc.subject.keywordPlusSTEGANOGRAPHY-
dc.subject.keywordPlusSTEGANALYSIS-
dc.subject.keywordPlusIMAGES-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
Go to Link
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Dahuin photo

Jung, Dahuin
College of Information Technology (School of Computer Science and Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE