Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

228 results about "Steganalysis" patented technology

Steganalysis is the study of detecting messages hidden using steganography; this is analogous to cryptanalysis applied to cryptography.

Hypercomplex deep learning methods, architectures, and apparatus for multimodal small, medium, and large-scale data representation, analysis, and applications

A method and system for creating hypercomplex representations of data includes, in one exemplary embodiment, at least one set of training data with associated labels or desired response values, transforming the data and labels into hypercomplex values, methods for defining hypercomplex graphs of functions, training algorithms to minimize the cost of an error function over the parameters in the graph, and methods for reading hierarchical data representations from the resulting graph. Another exemplary embodiment learns hierarchical representations from unlabeled data. The method and system, in another exemplary embodiment, may be employed for biometric identity verification by combining multimodal data collected using many sensors, including, data, for example, such as anatomical characteristics, behavioral characteristics, demographic indicators, artificial characteristics. In other exemplary embodiments, the system and method may learn hypercomplex function approximations in one environment and transfer the learning to other target environments. Other exemplary applications of the hypercomplex deep learning framework include: image segmentation; image quality evaluation; image steganalysis; face recognition; event embedding in natural language processing; machine translation between languages; object recognition; medical applications such as breast cancer mass classification; multispectral imaging; audio processing; color image filtering; and clothing identification.
Owner:BOARD OF RGT THE UNIV OF TEXAS SYST

Spatial-domain image steganography method and system based on generative adversarial network

ActiveCN108346125ASimple designSmall number of structural parametersImage enhancementImage analysisCode moduleSteganalysis
The invention discloses a spatial-domain image steganography method and system based on generative adversarial network. The carrier image is converted into a probability graph through the generation network of a U-shaped structure, and then the probability graph is coded by utilizing a hyperbolic tangent coding module, a tampering point graph is generated, and the carrier image and the tampering point graph are added to generate a secret-carrying image; and then a steganography analysis network is used for distinguishing the carrier image and the secret-carrying image, and the classification result is fed back to the generation network in an error mode; and finally, the trained generation network and the coding module are combined together, as a final spatial-domain image steganography model, the carrier image is input into the whole model, and the secret-carrying image is output. The invention further discloses a space-domain image steganography system based on the generative adversarial network, and the system includes a generation network module, an encoding module and an image steganography module. According to the spatial-domain image steganography method based on the generative adversarial network, the security is obviously improved, and the design is simple.
Owner:SUN YAT SEN UNIV

A generative image steganography method based on an adversarial network

The invention particularly relates to a generative image steganography method based on an adversarial network, which comprises the following steps: a rule table is established, and secret informationto be hidden is converted into coordinate information according to the rule table; According to a two-point one-line principle, a ciphertext generator is established, and ciphertext coordinate point information is obtained; The sender randomly selects the ciphertext coordinate point information, replaces the label information with the ciphertext coordinate point information, inputs the ciphertextcoordinate point information into the generator, and generates a transfer image of a specified category; After receiving the transmission image, the receiver inputs the transmission image into a discriminator to obtain a category label, and then ciphertext information can be extracted; Decrypting is performed to obtain hidden coordinate information according to a two-point one-line principle; Andhidden secret information is obtained by comparing with the rule table, and information extraction is realized. According to the method, steganalysis detection based on statistics can be fundamentallyresisted, the safety of information transmission is improved, and meanwhile the steganalysis resisting capability is greatly enhanced.
Owner:ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE

Steganography detection method for audio subjected to MP3Stego steganography

The invention discloses a steganography detection method for audio subjected to MP3Stego steganography. The method includes the steps of forming a sample library through MP3 compressed audio not subjected to steganography and MP3 compressed audio subjected to steganography, conducting double-compression coding on each sample to obtain carrier estimation of each sample, extracting a quantized MDCT coefficient of each frame in each sample to obtain a first coefficient matrix corresponding to the sample, extracting a quantized MDCT coefficient of each frame in the carrier estimation of each sample to obtain a second coefficient matrix corresponding to the carrier estimation, calculating a Hausdorff distance value between corresponding lines in each first coefficient matrix and the corresponding coefficient matrix to obtain the final steganography analysis characteristic line vector of each sample, obtaining a training template through SVM classifier training, and detecting the MP3 compressed audio to be detected through the training template. The method has the advantages that whether the MP3 compressed audio is subjected to MP3Stego steganography or not can be quite accurately determined, and particularly, the quite high detection efficiency can still be obtained under the condition that the steganography information embedment rate is low.
Owner:NINGBO UNIV

Digital steganography and steganalysis method for color image

InactiveCN103745479AImprove search matching speedGuaranteed Unique AuthenticationImage analysisColor imageSteganalysis
The invention relates to the technical field of information hiding and detection. A digital steganography and steganalysis method for a color image is characterized in that a secret information embedding step comprises the following small steps: generating a general image data buffer and data steganography factors; performing a series of function transformations on the color image and the data steganography factors to generate a steganography data-contained color image. A secret information extracting step comprises the following small steps: generating the general image data buffer, and performing a series of function transformations on the steganography data-contained color image to read out steganography data. According to the digital steganography and steganalysis method for the color image disclosed by the invention, by solidifying the steganography data, the steganography speed is increased, and the data steganography CPU (central processing unit) time and the steganography data reading CPU time are shortened. The digital steganography and steganalysis method for the color image supports various color image formats. By adopting the thread pool technique, the data steganography concurrence number is improved, and the robustness of data of preventing steganography attack is enhanced.
Owner:FUJIAN ZHONGGENG SHITONG INFORMATION TECH CO LTD

Airspace image steganalysis method based on full dense connection network

The invention provides an airspace image steganalysis method based on a full dense connection network. The method comprises the following steps of building the full dense connection network includinga plurality of dense connection blocks, wherein each dense connection block comprises a plurality of groups of convolution layers and one average pooling layer, the adjacent dense connection blocks are connected, and the network width of the dense connection blocks are increased in a way of being the multiples of 2 in a sequence from lower layers to high layers; obtaining an original feature graphof the airspace image to be recognized through convolution operation; inputting the original feature graph into the full dense connection network; performing multilayer convolution and pooling operation on the original feature graph to obtain a multi-dimensional feature vector; performing dimension reduction on the multi-dimensional feature vector into a two-dimensional feature vector through thefull connection layer; and inputting the two-dimensional feature vector into a softmax activation function to obtain a prediction probability value for predicting whether the airspace image is a steganalysis image or an ordinary image. The airspace image steganalysis method can accelerate the wider image feature reuse; the signal propagation of steganalysis weak signals in the network is reinforced; and the steganalysis analysis detection performance is improved.
Owner:BEIJING JIAOTONG UNIV

Video steganography analysis method based on space-time domain local binary pattern

The invention discloses a video steganography analysis method based on a space-time domain local binary pattern. The video steganography analysis method includes step 1, classifying each frame in a video sequence to be analyzed by taking 8x8 blocks as a unit according to regional activity classifying standards; step 2, respectively establishing three-dimensional orthogonal planes, containing time-space coordinate axis, corresponding to classifying result, and making statistic analysis on LBP histograms of different three-dimensional orthogonal planes corresponding to each area in the classifying result; step 3, introducing a concept of activity factor, and enabling the activity factor and the corresponding LBP histograms to be in operation to acquire ST_LBP features; step 4, utilizing a Fisher Ratio method for feature selection, and realizing classifying recognition of steganographic information. Compared with the prior art, the video steganography analysis method has the advantages that by introducing the activity factor, interference, on detection result, caused by movement of an activity area object can be lowered, so that detection effectiveness is improved effectively; limitation of feature dimension is avoided, and valuing of radius R and field point number P in an LBP definition can be further expanded, so that relevance of space-time domain of the video sequence is utilized more effectively.
Owner:TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products