語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Steganography with Statistical Model...
~
ProQuest Information and Learning Co.
Steganography with Statistical Models of Image Noise Residuals.
紀錄類型:
書目-語言資料,手稿 : Monograph/item
正題名/作者:
Steganography with Statistical Models of Image Noise Residuals./
作者:
Sedighianaraki, Vahid.
面頁冊數:
1 online resource (111 pages)
附註:
Source: Dissertation Abstracts International, Volume: 78-12(E), Section: B.
Contained By:
Dissertation Abstracts International78-12B(E).
標題:
Electrical engineering. -
電子資源:
click for full text (PQDT)
ISBN:
9780355083941
Steganography with Statistical Models of Image Noise Residuals.
Sedighianaraki, Vahid.
Steganography with Statistical Models of Image Noise Residuals.
- 1 online resource (111 pages)
Source: Dissertation Abstracts International, Volume: 78-12(E), Section: B.
Thesis (Ed.D.)--State University of New York at Binghamton, 2017.
Includes bibliographical references
Steganography alters innocuously looking cover objects in order to communicate in secrecy. This manuscript focuses on steganography in digital images, arguably the most popular and most studied cover objects. The current focus of steganography is on content-adaptive schemes that are realized through minimizing a distortion function designed to focus the attention of the embedding on highly textured regions of images that are hard to model and where the embedding is less detectable. The actual embedding is done through efficient coding schemes. As interesting as this whole paradigm of embedding by minimizing distortion might seem, distortion in not detectability. It is only linked heuristically through the design of the distortion function.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2018
Mode of access: World Wide Web
ISBN: 9780355083941Subjects--Topical Terms:
596380
Electrical engineering.
Index Terms--Genre/Form:
554714
Electronic books.
Steganography with Statistical Models of Image Noise Residuals.
LDR
:04618ntm a2200385Ki 4500
001
917809
005
20181022132248.5
006
m o u
007
cr mn||||a|a||
008
190606s2017 xx obm 000 0 eng d
020
$a
9780355083941
035
$a
(MiAaPQ)AAI10282438
035
$a
(MiAaPQ)binghamton:12501
035
$a
AAI10282438
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Sedighianaraki, Vahid.
$3
1191982
245
1 0
$a
Steganography with Statistical Models of Image Noise Residuals.
264
0
$c
2017
300
$a
1 online resource (111 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Dissertation Abstracts International, Volume: 78-12(E), Section: B.
500
$a
Adviser: Jessica Fridrich.
502
$a
Thesis (Ed.D.)--State University of New York at Binghamton, 2017.
504
$a
Includes bibliographical references
520
$a
Steganography alters innocuously looking cover objects in order to communicate in secrecy. This manuscript focuses on steganography in digital images, arguably the most popular and most studied cover objects. The current focus of steganography is on content-adaptive schemes that are realized through minimizing a distortion function designed to focus the attention of the embedding on highly textured regions of images that are hard to model and where the embedding is less detectable. The actual embedding is done through efficient coding schemes. As interesting as this whole paradigm of embedding by minimizing distortion might seem, distortion in not detectability. It is only linked heuristically through the design of the distortion function.
520
$a
One of the contributions of this dissertation is to formulate this problem through statistical hypothesis testing theory by modeling image noise residuals as a sequence of independent and quantized zero-mean Gaussian random variables. Within this model, the most secure steganographic approach is the one that Minimizes the Power of the Most Powerful Detector (MiPOD) built to distinguish between cover and stego objects. To the best of the author's knowledge, the proposed model-based embedding scheme, MiPOD, is the first embedding scheme of this kind which has a comparable security with respect to current state of the art in content-adaptive steganography. This dissertation also looks into many interesting implications of having a model-based approach for steganography and steganalysis. The model-based detector is used to assess the performance of current feature-based steganalysis schemes and their optimality. A new detectability-limited sender is proposed that adjusts the embedded payload inside each image up to a certain prescribed level of detectability. Furthermore, for the first time, the proposed detector enables us to measure the secure payload size for a single image for a certain prescribed detectability.
520
$a
Recently, it has been shown that the detection power of feature-based steganalysis can be improved by reducing the redundancy in the extracted feature vectors by focusing the attention of the feature extractor more towards the heavily embedded regions inside each image, hence selection-channel-aware feature sets. This dissertation, among other contributions, presents a systematic approach to study the effect of having inaccuracies between steganographer's activities and steganalyst's presumed assumptions about those activities, e.g., the embedding payload, and having access to the cover source. It is proposed to model these inaccuracies as four different types of Warden with different levels of knowledge about the selection channel to assess the security of state-of-the-art embedding schemes under these different settings.
520
$a
Finally, this dissertation uses the proposed model-based schemes to reformulate the problem of batch steganography and pooled steganalysis. The most powerful detector, aware of the spreading strategies used by Alice inside each communication bag of images, is built as a matched filter and further simplified using a practical estimation approach. Furthermore, three intuitive payload spreading strategies are proposed with roots inside both model-based and content-adaptive steganography.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2018
538
$a
Mode of access: World Wide Web
650
4
$a
Electrical engineering.
$3
596380
650
4
$a
Computer science.
$3
573171
650
4
$a
Engineering.
$3
561152
655
7
$a
Electronic books.
$2
local
$3
554714
690
$a
0544
690
$a
0984
690
$a
0537
710
2
$a
ProQuest Information and Learning Co.
$3
1178819
710
2
$a
State University of New York at Binghamton.
$b
Electrical and Computer Engineering.
$3
1185507
773
0
$t
Dissertation Abstracts International
$g
78-12B(E).
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10282438
$z
click for full text (PQDT)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入