Image Steganalysis of Low Rate Embedding in Spatial Domain

Abstract LSB embedding in spatial domain with very low rate can be easily performed and its detection in spite of many researches is very hard, while BOSS competition has been held to break an adaptive embedding algorithm with low rate. Thus, proposing powerful steganalyzer of very low rate in spatial domain is highly requested. In […]

Eigenvalues-based LSB steganalysis

Abstract: So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the present paper is intended to introduce a […]

SVD and Noise Estimation based Image Steganalysis

Abstract: We propose a novel image steganalysis method, based on singular value decomposition and noise estimation, for the spatial domain LSB embedding families. We first define a content independence parameter, DS, that is calculated for each LSB embedding rate. Next, we estimate the DS curve and use noise estimation to improve the curve approximation accuracy. […]

Risk of attack coefficient effect on availability of adhoc networks

Abstract: Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In […]

About

I am a member of Intelligent Information Systems (IIS) research lab at Penn State. I am working with Prof. James Wang (adviser) and Prof. Jesse Barlow (co-adviser), also collaborating with Prof. Zihan Zhou. My research interests lie in the area of computer vision and big visual data computing. More specifically, I am interested in image aesthetics using […]

Persian Boy Names

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z   A Top آبان AbAn 8th month of the Iranian calendar; Name of a certain angel آبید Abid Spark, fire عبّاس abbAs (A) Frowning, looking austere; Lion; Name of Mohammad‘s uncle ابوعلی abou-ali Avicenna, Name of a famous Iranian scientist and philosopher آبتین Abtin A character in Shahnameh (Feraydoon‘s father) آدر Adar Fire عادل […]

CAPTAIN: Comprehensive Composition Assistance for Photo Taking

Abstract: Many people are interested in taking astonishing photos and sharing with others. Emerging high-tech hardware and software facilitate ubiquitousness and functionality of digital photography. Because composition matters in photography, researchers have leveraged some common composition techniques, such as the rule of thirds, the triangle technique, and the perspective-related techniques, to assess the aesthetic quality […]

CAGE: Contention-Aware Game-theoretic modEl

Abstract Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications’ need. In this paper […]