Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

Development of an efficient steganalysis framework for uncovering hidden data in digital media.

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Report on societal challenges and acceptance (öffnet in neuem Fenster)

Report describing the results of the empirical study.

Report on hybrid computing solutions (Initial) (öffnet in neuem Fenster)

The initial version of the report that will define a description of the architecture of the set of tools that should be integrated locally and remotely according to their technical specifications.

Report on CoC, logging/auditing (Initial) (öffnet in neuem Fenster)

Initial report on chain of custody logging and auditing functionalities requirements and guidelines for integration of components

UNCOVER Ethics and Privacy Handbook (öffnet in neuem Fenster)

This handbook will provide both the code of good practice and the ethical and privacy documentation requirements necessary for partners to carry out their activities

Report on CoC, logging/auditing (Final) (öffnet in neuem Fenster)

Final report on chain of custody, logging and auditing functionalities, requirements and guidelines for integration of components, review of UNCOVER platform and tools as implemented with respect to these components; including, e.g., a “lessons learned” analysis.

Dissemination and communication report (Final) (öffnet in neuem Fenster)

In three iterations, an overview on the developed dissemination material and communication activities is reported, ensuring an ongoing monitoring of activities and materials. This deliverable is the final report on this activity.

Toolbox of publicly releasable detectors developed in T5.1 (öffnet in neuem Fenster)

The final version of detectors based on security holes, releasable to the public, will be provided, together with a report explaining the logic behind each of the detector. The set of releasable detectors will be determined by the SAB.

Dissemination and communication report (initial) (öffnet in neuem Fenster)

In three iterations an overview on the developed dissemination material and communication activities is reported ensuring an ongoing monitoring of activities and materials This deliverable is the first report The second report is foreseen at M24 The final update will be an official deliverable D811 delivered at M36

Data Management Plan (Intermediate) (öffnet in neuem Fenster)

This report provides the first update of the data management life cycle for the data collection generation exploitation processing and preservation

Report on hybrid computing solutions (Final) (öffnet in neuem Fenster)

The final version of the report that will define a description of the architecture of the set of tools that should be integrated locally and remotely according to their technical specifications.

Legal requirements report (öffnet in neuem Fenster)

The legal requirements report of UNCOVER will be based on relevant international and national regulation It will contain an indepth analysis of European regulation and of the countries participating in the consortium in the field of criminal investigations through digital and technological methods

Data Management Plan (Final) (öffnet in neuem Fenster)

This report provides the final version of the data management life cycle for the data: collection, generation, exploitation, processing and preservation.

Report on factors contributing to the CSM (Public) (öffnet in neuem Fenster)

A publicly available report on the analysis of the elements contributing to the CSM for image, audio and video steganalysis will be provided. Different steganalysis strategies (based on feature extractors, based on deep-learning, statistical steganalysis) and different databases will be used in order to assess the impact of each factor.

Data Management Plan (Initial) (öffnet in neuem Fenster)

This deliverable describes the data management life cycle for the data collection generation exploitation processing and preservation An internal update will be delivered to the consortium partners at M18 and a final official deliverable at M36

Dissemination and communication report (Intermediate) (öffnet in neuem Fenster)

In three iterations, an overview on the developed dissemination material and communication activities is reported, ensuring an ongoing monitoring of activities and materials. This deliverable is the second report on this activity.

Open information hub and social media channels (öffnet in neuem Fenster)

This deliverable reports the implementation of the open informationhub as well as the planned and already set up social media channels and activities

Steganalysis contest and analysis report: Contest (öffnet in neuem Fenster)

The actual contest will start at M20 and last until M24. The report on the analysis of the results is foreseen in M30.The initial deliverable consists of making available the data for the contest.

Steganalysis contest and analysis report: Report (öffnet in neuem Fenster)

The actual contest will start at M20 and last until M24. The report on the analysis of the results is foreseen in M30.The current deliverable consists of the report describes the analysis of the results of the contest.

Veröffentlichungen

Compatibility and Timing Attacks for JPEG Steganalysis (öffnet in neuem Fenster)

Autoren: Etienne Levecque, Patrick Bas, Jan Butora
Veröffentlicht in: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2024, Seite(n) 29-35
Herausgeber: ACM
DOI: 10.1145/3577163.3595093

Causes and Effects of Unanticipated Numerical Deviations in Neural Network Inference Frameworks.

Autoren: Alexander Schlögl, Nora Hofer and Rainer Böhme
Veröffentlicht in: 37th Conference on Neural Information Processing Systems, 2023
Herausgeber: Conference on Neural Information Processing Systems

The ALASKA project: An interesting mix of theoretical advances and open science

Autoren: Cogranne, Rémi
Veröffentlicht in: ERI Network & Telcom - EUt+ Workshop, 2022
Herausgeber: EUt+ European Telecommunications and Networks Institute

Explainability and Interpretability for Media Forensic Methods: Illustrated on the Example of the Steganalysis Tool Stegdetect (öffnet in neuem Fenster)

Autoren: Christian Kraetzer, Mario Hildebrandt
Veröffentlicht in: Proceedings of the 19th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2024, Seite(n) 585-592, ISBN 978-989-758-679-8
Herausgeber: SCITEPRESS - Science and Technology Publications
DOI: 10.5220/0012423800003660

Leveraging Data Geometry to Mitigate CSM in Steganalysis (öffnet in neuem Fenster)

Autoren: Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas, Tomáš Pevný
Veröffentlicht in: 2023 IEEE International Workshop on Information Forensics and Security (WIFS), 2024
Herausgeber: IEEE
DOI: 10.1109/wifs58808.2023.10374944

Identification de Développements d'Images par Matrices de Corrélations

Autoren: Mallet, Antoine; Cogranne, Rémi; Bas, Patrick; Giboulot, Quentin
Veröffentlicht in: XXIXème Colloque Francophone de Traitement du Signal et des Images, Université de Grenoble; Association Gretsi, Aug 2023, Grenoble, France, Ausgabe 16, 2023
Herausgeber: GRETSI

Adaptation de domaine pour l’analyse forensique d’images.

Autoren: Rony Abecidan, Vincent Itier, Jérémie Boulanger, and Patrick Bas
Veröffentlicht in: Groupe de Recherche et d'Etudes de Traitement du Signal et des Images (GRETSI), 2022
Herausgeber: GRETSI

A Critical Look into Quantization Table Generalization Capabilities of CNN-based Double JPEG Compression Detection

Autoren: Elena Rodriguez-Lois, David Vazquez-Pad ́ın, Fernando Perez-Gonzalez, Pedro Comesana-Alfaro
Veröffentlicht in: European Signal Processing Conference (EUSIPCO 2022), 2022
Herausgeber: EUSIPCO 2022

The Cover Source Mismatch Problem in Deep-Learning Steganalysis

Autoren: Quentin Giboulot, Patrick Bas, Rémi Cogranne, and Dirk Borghys.
Veröffentlicht in: European Signal Processing Conference, 2022
Herausgeber: EUSIPCO

Linking Intrinsic Difficulty and Regret to Properties of Multivariate Gaussians in Image Steganalysis (öffnet in neuem Fenster)

Autoren: Antoine Mallet, Rémi Cogranne, Patrick Bas
Veröffentlicht in: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Seite(n) 31-39
Herausgeber: ACM
DOI: 10.1145/3658664.3659643

Analysis and Mitigation of the False Alarms of the Reverse JPEG Compatibility Attack (öffnet in neuem Fenster)

Autoren: Jan Butora, Patrick Bas, Rémi Cogranne
Veröffentlicht in: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2024, Seite(n) 59-66
Herausgeber: ACM
DOI: 10.1145/3577163.3595092

Fighting the Reverse JPEG Compatibility Attack: Pick your Side

Autoren: Jan Butora
Veröffentlicht in: The 10th ACM Workshop on Information Hiding and Multimedia Security, 2022
Herausgeber: 10th ACM Workshop on Information Hiding and Multimedia Security

Vers une stéganalyse certifiée pour des images JPEG

Autoren: Etienne Levecque, Jan Butora, John Klein, and Patrick Bas
Veröffentlicht in: Groupe de Recherche et d'Etudes de Traitement du Signal et des Images (GRETSI), 2022
Herausgeber: GRETSI

Toward Reliable JPEG Steganalysis (at QF100)

Autoren: Etienne Levecque, John Klein, Patrick Bas, Jan Butora
Veröffentlicht in: IEEE International Workshop on Information Forensics and Security, 2022
Herausgeber: IEEE International Workshop on Information Forensics and Security

Know Your Library: How the libjpeg Version Influences Compression and Decompression Results

Autoren: Martin Beneš, Nora Hofer, Rainer Böhme
Veröffentlicht in: Proceedings of the 10th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC), 2022
Herausgeber: Proceedings of the 10th ACM Workshop on Information Hiding and Multimedia Security (IH&MMSEC)

Formalizing cover-source mismatch as a robust optimization

Autoren: Domin Sepak, Lukas Adam, Tomas Pevny
Veröffentlicht in: European Signal Processing Conference (EUSIPCO 2022), 2022
Herausgeber: EUSIPCO 2022

JPEG Steganalysis Using Leaked Cover Thumbnails (öffnet in neuem Fenster)

Autoren: Martin Beneš, Benedikt Lorch, Rainer Böhme
Veröffentlicht in: 2023 IEEE International Workshop on Information Forensics and Security (WIFS), Ausgabe 1, 2024, Seite(n) 1-6
Herausgeber: IEEE
DOI: 10.1109/wifs58808.2023.10374587

UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media (öffnet in neuem Fenster)

Autoren: Vaila Leask; Rémi Cogranne; Dirk Borghys; Helena Bruyninckx
Veröffentlicht in: 17th International Conference on Availability, Reliability and Security (ARES 2022), Aug 2022, Vienna, Austria, Ausgabe 1, 2022
Herausgeber: ARES 2022
DOI: 10.1145/3538969.3544468

Detection of the Adobe Pattern

Autoren: Jan Butora
Veröffentlicht in: 32nd European Signal Processing Conference (EUPSICO 2024), 2024
Herausgeber: European Signal Processing Conference

Recherche et Analyse de Sources Représentatives pour la Stéganalyse

Autoren: Rony Abecidan, Vincent Itier, Jérémie Boulanger, Patrick Bas
Veröffentlicht in: Proceeding of the Colloque Francophone de Traitement du Signal et des Images - GRETSI'23, 2023
Herausgeber: Grenoble, France

Attaque de Compatibilité contre la Stéganographie JPEG

Autoren: Levecque, Etienne; Bas, Patrick; Butora, Jan
Veröffentlicht in: Proceedings of the Colloque Francophone de Traitement du Signal et des Images - GRETSI'23, Ausgabe 5, 2023
Herausgeber: GRETSI

High Quality JPEG Compressor Detection via Decompression Error

Autoren: Jan Butora; Patrick Bas.
Veröffentlicht in: Groupe de Recherche et d'Etudes de Traitement du Signal et des Images (GRETSI), 2022
Herausgeber: GRETSI

The Effect of the JPEG Implementation on the Cover-Source Mismatch Error in Image Steganalysis

Autoren: Martin Beneš, Nora Hofer and Rainer Böhme
Veröffentlicht in: European Signal Processing Conference (EUSIPCO 2022), 2022
Herausgeber: EUSIPCO 2022

The Adobe Hidden Feature and its Impact on Sensor Attribution (öffnet in neuem Fenster)

Autoren: Jan Butora, Patrick Bas
Veröffentlicht in: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Seite(n) 143-148
Herausgeber: ACM
DOI: 10.1145/3658664.3659650

Progressive JPEGs in the Wild: Implications for Information Hiding and Forensics (öffnet in neuem Fenster)

Autoren: Nora Hofer, Rainer Boehme
Veröffentlicht in: Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security, 2024, Seite(n) 47-58
Herausgeber: ACM
DOI: 10.1145/3577163.3595097

Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?

Autoren: A. Méreur, A. Mallet and R. Cogranne
Veröffentlicht in: International Conference on Availability, Reliability and Security: ARES, 2023
Herausgeber: ARES

Landscape More Secure Than Portrait? Zooming Into the Directionality of Digital Images With Security Implications

Autoren: Benedikt Lorch, Rainer Böhme
Veröffentlicht in: 33th USENIX Security Symposium, 2024
Herausgeber: USENIX

Kerckhoffs in Prison: A Study of the Steganalyst’s Knowledge

Autoren: Martin Beneš, Rainer Böhme
Veröffentlicht in: WIFS 2024 - 2024 IEEE International Workshop on Information Forensics and Security, 2024
Herausgeber: IEEE

Using Set Covering to Generate Databases for Holistic Steganalysis

Autoren: Rony Abecidan, Vincent Itier, Jeremie Boulanger, Patrick Bas, Tomas Pevny
Veröffentlicht in: IEEE International workshop on Informations Forensic and Security, 2022
Herausgeber: WIFS 2022 - 14th IEEE International workshop on Informations Forensic and Security

Increasing Trust in Image Analysis by Detecting Trellis Quantization in JPEG Images

Autoren: Nora Hofer
Veröffentlicht in: 2024 IEEE International Conference on Image Processing (ICIP), 2024
Herausgeber: IEEE

Statistical Correlation as a Forensic Feature to Mitigate the Cover-Source Mismatch (öffnet in neuem Fenster)

Autoren: Antoine Mallet, Patrick Bas, Rémi Cogranne
Veröffentlicht in: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Seite(n) 87-94
Herausgeber: ACM
DOI: 10.1145/3658664.3659638

Exploring Diffusion-Inspired Pixel Predictors for WS Steganalysis (öffnet in neuem Fenster)

Autoren: Martin Beneš, Rainer Böhme
Veröffentlicht in: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, 2024, Seite(n) 75-86
Herausgeber: ACM
DOI: 10.1145/3658664.3659645

Side-Informed Steganography for JPEG Images by Modeling Decompressed Images (öffnet in neuem Fenster)

Autoren: Jan Butora, Patrick Bas
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, Ausgabe 18, 2023, Seite(n) 2683-2695, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2023.3268884

Errorless Robust JPEG Steganography Using Outputs of JPEG Coders (öffnet in neuem Fenster)

Autoren: Jan Butora, Pauline Puteaux, Patrick Bas
Veröffentlicht in: IEEE Transactions on Dependable and Secure Computing, Ausgabe 21, 2024, Seite(n) 2394-2406, ISSN 1545-5971
Herausgeber: IEEE Computer Society
DOI: 10.1109/tdsc.2023.3306379

Size-Independent Reliable CNN for RJCA Steganalysis

Autoren: Jan Butora and Patrick Bas
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, 2023, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers

The Non-Zero-Sum Game of Steganography in Heterogeneous Environments (öffnet in neuem Fenster)

Autoren: Eva Giboulot, Tomáš Pevný, Andrew D. Ker
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, Ausgabe 18, 2024, Seite(n) 4436-4448, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2023.3295945

Finding Incompatible Blocks for Reliable JPEG Steganalysis

Autoren: Etienne Levecque
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, 2024, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers

Image steganography approaches and their detection strategies: a survey (öffnet in neuem Fenster)

Autoren: Meike Helena Kombrink, Zeno Jean Marius Hubert Geradts, Marcel Worring
Veröffentlicht in: ACM Computing Surveys, 2024, ISSN 0360-0300
Herausgeber: Association for Computing Machinary, Inc.
DOI: 10.1145/3694965

Cover-Source Mismatch in Steganalysis: Systematic Review (öffnet in neuem Fenster)

Autoren: Antoine Mallet, Martin Benes, Rémi Cogranne
Veröffentlicht in: Journal of Information Security, 2024, ISSN 2193-1801
Herausgeber: Springer Science and Business Media Deutschland GmbH
DOI: 10.21203/rs.3.rs-3812991/v1

Multivariate Side-Informed Gaussian Embedding Minimizing Statistical Detectability (öffnet in neuem Fenster)

Autoren: Quentin Giboulot, Patrick Bas, and Rémi Cogranne
Veröffentlicht in: IEEE Transactions on Information Forensics and Security, 2022, Seite(n) Vol.17, pp.1841 - 1854, ISSN 1556-6013
Herausgeber: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tifs.2022.3173184

Uncovering the social impact of digital steganalysis tools applied to cybercrime investigations: a European Union perspective (öffnet in neuem Fenster)

Autoren: Alejandro Nicolás-Sánchez, Francisco J. Castro-Toledo
Veröffentlicht in: CrimRxiv, 2024
Herausgeber: Springer BMC - Crime Science Journal
DOI: 10.21428/cb6ab371.861e761b

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0