Details

Machine Learning in Image Steganalysis


Machine Learning in Image Steganalysis


IEEE Press 1. Aufl.

von: Hans Georg Schaathun

91,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 05.09.2012
ISBN/EAN: 9781118437988
Sprache: englisch
Anzahl Seiten: 296

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

Steganography is the art of communicating a secret message, hiding the very existence of a secret message. This book is an introduction to steganalysis as part of the wider trend of multimedia forensics, as well as a practical tutorial on machine learning in this context. It looks at a wide range of feature vectors proposed for steganalysis with performance tests and comparisons. Python programs and algorithms are provided to allow readers to modify and reproduce outcomes discussed in the book.
<p><b>Preface xi</b></p> <p><b>PART I OVERVIEW</b></p> <p><b>1 Introduction 3</b></p> <p>1.1 Real Threat or Hype? 3</p> <p>1.2 Artificial Intelligence and Learning 4</p> <p>1.3 How to Read this Book 5</p> <p><b>2 Steganography and Steganalysis 7</b></p> <p>2.1 Cryptography versus Steganography 7</p> <p>2.2 Steganography 8</p> <p>2.3 Steganalysis 17</p> <p>2.4 Summary and Notes 23</p> <p><b>3 Getting Started with a Classifier 25</b></p> <p>3.1 Classification 25</p> <p>3.2 Estimation and Confidence 28</p> <p>3.3 Using libSVM 30</p> <p>3.4 Using Python 33</p> <p>3.5 Images for Testing 38</p> <p>3.6 Further Reading 39</p> <p><b>PART II FEATURES</b></p> <p><b>4 Histogram Analysis 43</b></p> <p>4.1 Early Histogram Analysis 43</p> <p>4.2 Notation 44</p> <p>4.3 Additive Independent Noise 44</p> <p>4.4 Multi-dimensional Histograms 54</p> <p>4.5 Experiment and Comparison 63</p> <p><b>5 Bit-plane Analysis 65</b></p> <p>5.1 Visual Steganalysis 65</p> <p>5.2 Autocorrelation Features 67</p> <p>5.3 Binary Similarity Measures 69</p> <p>5.4 Evaluation and Comparison 72</p> <p><b>6 More Spatial Domain Features 75</b></p> <p>6.1 The Difference Matrix 75</p> <p>6.2 Image Quality Measures 82</p> <p>6.3 Colour Images 86</p> <p>6.4 Experiment and Comparison 86</p> <p><b>7 The Wavelets Domain 89</b></p> <p>7.1 A Visual View 89</p> <p>7.2 The Wavelet Domain 90</p> <p>7.3 Farid’s Features 96</p> <p>7.4 HCF in the Wavelet Domain 98</p> <p>7.5 Denoising and the WAM Features 101</p> <p>7.6 Experiment and Comparison 106</p> <p><b>8 Steganalysis in the JPEG Domain 107</b></p> <p>8.1 JPEG Compression 107</p> <p>8.2 Histogram Analysis 114</p> <p>8.3 Blockiness 122</p> <p>8.4 Markov Model-based Features 124</p> <p>8.5 Conditional Probabilities 126</p> <p>8.6 Experiment and Comparison 128</p> <p><b>9 Calibration Techniques 131</b></p> <p>9.1 Calibrated Features 131</p> <p>9.2 JPEG Calibration 133</p> <p>9.3 Calibration by Downsampling 137</p> <p>9.4 Calibration in General 146</p> <p>9.5 Progressive Randomisation 148</p> <p><b>PART III CLASSIFIERS</b></p> <p><b>10 Simulation and Evaluation 153</b></p> <p>10.1 Estimation and Simulation 153</p> <p>10.2 Scalar Measures 158</p> <p>10.3 The Receiver Operating Curve 161</p> <p>10.4 Experimental Methodology 170</p> <p>10.5 Comparison and Hypothesis Testing 173</p> <p>10.6 Summary 176</p> <p><b>11 Support Vector Machines 179</b></p> <p>11.1 Linear Classifiers 179</p> <p>11.2 The Kernel Function 186</p> <p>11.3 <i>ν</i>-SVM 189</p> <p>11.4 Multi-class Methods 191</p> <p>11.5 One-class Methods 192</p> <p>11.6 Summary 196</p> <p><b>12 Other Classification Algorithms 197</b></p> <p>12.1 Bayesian Classifiers 198</p> <p>12.2 Estimating Probability Distributions 203</p> <p>12.3 Multivariate Regression Analysis 209</p> <p>12.4 Unsupervised Learning 212</p> <p>12.5 Summary 215</p> <p><b>13 Feature Selection and Evaluation 217</b></p> <p>13.1 Overfitting and Underfitting 217</p> <p>13.2 Scalar Feature Selection 220</p> <p>13.3 Feature Subset Selection 222</p> <p>13.4 Selection Using Information Theory 225</p> <p>13.5 Boosting Feature Selection 238</p> <p>13.6 Applications in Steganalysis 239</p> <p><b>14 The Steganalysis Problem 245</b></p> <p>14.1 Different Use Cases 245</p> <p>14.2 Images and Training Sets 250</p> <p>14.3 Composite Classifier Systems 258</p> <p>14.4 Summary 262</p> <p><b>15 Future of the Field 263</b></p> <p>15.1 Image Forensics 263</p> <p>15.2 Conclusions and Notes 265</p> <p><b>Bibliography 267</b></p> <p><b>Index 279</b></p>
<p><b>Hans Georg Schaathun, Department of Computing, University of Surrey, UK</b><br />Dr Schaathun was previously a lecturer in coding and cryptography at the University of Bergen. Since February 2006, he has been a lecturer at the University of Surrey, UK, belonging to the research group in Digital Watermarking and Multimedia Security. His main research areas are applications of coding theory in information hiding, and machine learning techniques in steganalysis. He teaches Computer Security and Steganography at MSc level, and Functional Programming Techniques at u/g level. Dr Scaathun has published more than 35 international, peer-reviewed articles, and is an associate editor of <i>EURASIP Journal of Information Security</i>.</p>
<p><i>Steganography</i> is the art of communicating a secret message, hiding the very existence of a secret message. This is typically done by hiding the message within a non-sensitive document. S<i>teganalysis</i> is the art and science of detecting such hidden messages.  The task in steganalysis is to take an object (communication) and classify it as either a steganogram or a clean document. Most recent solutions apply classification algorithms from machine learning and pattern recognition, which tackle problems too complex for analytical solution by teaching computers to learn from empirical data. </p> <p><b>Part 1</b>of the book is an introduction to steganalysis as part of the wider trend of multimedia forensics, as well as a practical tutorial on machine learning in this context. <b>Part 2</b> is a survey of a wide range of feature vectors proposed for steganalysis with performance tests and comparisons. <b>Part 3</b> is an in-depth study of machine learning techniques and classifier algorithms, and presents a critical assessment of the experimental methodology and applications in steganalysis.</p> <p>Key features: </p> <ul> <li>Serves as a tutorial on the topic of steganalysis with brief introductions to much of the basic theory provided, and also presents a survey of the latest research.</li> <li>Develops and formalises the application of machine learning in steganalysis; with much of the understanding of machine learning to be gained from this book adaptable for future study of machine learning in other applications. </li> <li>Contains Python programs and algorithms to allow the reader to modify and reproduce outcomes discussed in the book.</li> <li>Includes companion software available from the author’s website.</li> </ul>

Diese Produkte könnten Sie auch interessieren:

Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
EPUB ebook
114,99 €
Digital Communications with Emphasis on Data Modems
Digital Communications with Emphasis on Data Modems
von: Richard W. Middlestead
PDF ebook
171,99 €
Bandwidth Efficient Coding
Bandwidth Efficient Coding
von: John B. Anderson
PDF ebook
114,99 €