Network Capture

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 92445 Experts worldwide ranked by ideXlab platform

Olivier Jamet - One of the best experts on this subject based on the ideXlab platform.

  • From Manual to Automatic Stereoplotting: Evaluation of Different Road Network Capture Processes
    1996
    Co-Authors: Frederic Fol Leymarie, Sylvain Airault, Olivier Jamet
    Abstract:

    S. Airault, O. Jamet and F. Leymarie, "From Manual to Automatic Stereoplotting: Evaluation of Different Road Network Capture Processes". In: International Archives of Photogrammetry and Remote Sensing, Vol. 31(3), ISPRS, pp. 14-18, 1996.

  • Evaluation of the operation of a semiautomatic road Network Capture process
    Digital Photogrammetry and Remote Sensing '95, 1995
    Co-Authors: Sylvain Airault, Olivier Jamet
    Abstract:

    Within the framework of the French topographic database production, IGN2 is working on problems related to the photogrammetric data Capture automation. After a general presentation of the method we use for road extraction, this paper presents the use of this method within a semi-automatic approach, not very ambitious in terms of automation level but looking for a short term efficiency. A prototype has been implemented, taking into account the operational constraints, and a large part of the paper is dedicated to the evaluation of this method, evaluation in terms of geometric quality of the result and of data Capture time compared with a manual data Capture.© (1995) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.

Wu Songtao - One of the best experts on this subject based on the ideXlab platform.

  • Steganography and steganalysis : new approaches from natural images
    The Hong Kong Polytechnic University, 2017
    Co-Authors: Wu Songtao
    Abstract:

    xix, 113 pages : color illustrationsPolyU Library Call No.: [THS] LG51 .H577P COMP 2017 WuRecent advances of Network technology provide a great convenience for data communication. A key problem of data communication on the Internet is to transmit data from a sender to its receiver safely, without being eavesdropped, illegally accessed or tampered. Steganography, which is the art or science that hides secret message in an appropriate multimedia carrier including text, image, audio, or video [1], provides an effective solution. Unlike cryptography which emphasizes protecting the information security by making messages illegible, steganography intends to conceal the fact that a secret message is being sent and thus will not raise an opponents suspicion. Owing to this benefit, steganography plays a crucial role in many important applications such as military and commercial communications. In contrast to steganography, steganalysis aims to reveal the presence of secret messages embedded in digital medias [80]. This technique tries to make the steganography disable by determining whether a given carrier signal has hidden message, estimating the amount of hidden message, or, if possible, recovering the hidden message. For this nature, steganalysis is usually used as a measure to evaluate the security performance of steganographic algorithms. Natural images, which denote various photographs of typical environment we live in, are the most popular image files on the internet. Natural images are highly non­random, showing structural richness and strong local correlations. In this thesis, we focus on improving the performance of steganography and steganalysis by exploring these two properties of natural images. Following this idea, we investigate steganography and steganalysis from the following two aspects: For steganography, we improve its undetectability via selecting suitable natural cover images. Natural images have rich and complex structures, which provide steganographier enough space to hide secret messages. Unlike most existing works focusing on designing data embedding algorithms to preserve the structure of natural images, this work aims to improve the performnace of steganographic algorithms by selecting suitable natural cover images. A novel measure, which is only determined by the probability distribution of images, is proposed to analyze their hiding abilities. Based on statistical models of natural images, we prove that the proposed measure is an upper bound of the Kullback-Leibler (KL) divergence, a theoretical measure of steganographic security, both for spatial domain images and compressed domain images. With the measure, we investigate what properties that intrinsically make the stego images undetectable. Our conclusion is that the undetectability of the stego image relates to three factors: the entropy of the statistical model to represent the image, the energy of varying pixels across the image, and the number of nonzero DCT coefficients to reconstruct the image.For steganalysis, we improve its detection ability by modeling natural images with Convolutional Neural Networks (CNN). Natural images have strong spatially local correlation. This local correlation is distorted when secret messages are embedded, making it different from the normal correlation in natural images. Due to this fact, we propose to use CNN for image steganalysis. A unified model have been designed from two aspects. For the first, different from existing CNN based steganalytic algorithms that use a predefined highpass kernel to preprocess input images, we integrate the highpass filtering operation into the proposed Network by building a content suppression subNetwork. Highpass kernels in this subNetwork are adaptively updated in the Network training, allowing more powerful discriminative features come into the subsequent Network than that of CNN models with a predefined kernel. For the second, we propose a novel subNetwork to actively preserve and further strengthen the weak stego signal generated by secret messages based on residual learning, making the whole Network Capture the difference between cover images and stego images. Theoretically, we prove that the residual learning can preserve the weak stego signal for the deep model with any depths. Extensive experiments demonstrate that the proposed Network can detect the state of the art steganography with better accuracy than previous methods when cover images and their stego images are paired in training and testing. We further discuss the proposed method in more general case and analyze the limitation of a CNN model with batch normalization layers for image steganalysis. Empirical validations have demonstrated that the performance of steganography and steganalysis can be improved with appropriate natural image statistical models. Our future work will focus on two aspects: design advanced steganographic algorithms based on CNN models; develop CNN models without batch normalization layers to detect steganography in more general case and further extend them into the compressed domain image.Department of ComputingPh.D., Department of Computing, The Hong Kong Polytechnic University, 2017Doctorat

  • Steganography and steganalysis : new approaches from natural images
    The Hong Kong Polytechnic University, 2017
    Co-Authors: Wu Songtao
    Abstract:

    xix, 113 pages : color illustrationsPolyU Library Call No.: [THS] LG51 .H577P COMP 2017 WuRecent advances of Network technology provide a great convenience for data communication. A key problem of data communication on the Internet is to transmit data from a sender to its receiver safely, without being eavesdropped, illegally accessed or tampered. Steganography, which is the art or science that hides secret message in an appropriate multimedia carrier including text, image, audio, or video [1], provides an effective solution. Unlike cryptography which emphasizes protecting the information security by making messages illegible, steganography intends to conceal the fact that a secret message is being sent and thus will not raise an opponents suspicion. Owing to this benefit, steganography plays a crucial role in many important applications such as military and commercial communications. In contrast to steganography, steganalysis aims to reveal the presence of secret messages embedded in digital medias [80]. This technique tries to make the steganography disable by determining whether a given carrier signal has hidden message, estimating the amount of hidden message, or, if possible, recovering the hidden message. For this nature, steganalysis is usually used as a measure to evaluate the security performance of steganographic algorithms. Natural images, which denote various photographs of typical environment we live in, are the most popular image files on the internet. Natural images are highly non­random, showing structural richness and strong local correlations. In this thesis, we focus on improving the performance of steganography and steganalysis by exploring these two properties of natural images. Following this idea, we investigate steganography and steganalysis from the following two aspects: For steganography, we improve its undetectability via selecting suitable natural cover images. Natural images have rich and complex structures, which provide steganographier enough space to hide secret messages. Unlike most existing works focusing on designing data embedding algorithms to preserve the structure of natural images, this work aims to improve the performnace of steganographic algorithms by selecting suitable natural cover images. A novel measure, which is only determined by the probability distribution of images, is proposed to analyze their hiding abilities. Based on statistical models of natural images, we prove that the proposed measure is an upper bound of the Kullback-Leibler (KL) divergence, a theoretical measure of steganographic security, both for spatial domain images and compressed domain images. With the measure, we investigate what properties that intrinsically make the stego images undetectable. Our conclusion is that the undetectability of the stego image relates to three factors: the entropy of the statistical model to represent the image, the energy of varying pixels across the image, and the number of nonzero DCT coefficients to reconstruct the image.For steganalysis, we improve its detection ability by modeling natural images with Convolutional Neural Networks (CNN). Natural images have strong spatially local correlation. This local correlation is distorted when secret messages are embedded, making it different from the normal correlation in natural images. Due to this fact, we propose to use CNN for image steganalysis. A unified model have been designed from two aspects. For the first, different from existing CNN based steganalytic algorithms that use a predefined highpass kernel to preprocess input images, we integrate the highpass filtering operation into the proposed Network by building a content suppression subNetwork. Highpass kernels in this subNetwork are adaptively updated in the Network training, allowing more powerful discriminative features come into the subsequent Network than that of CNN models with a predefined kernel. For the second, we propose a novel subNetwork to actively preserve and further strengthen the weak stego signal generated by secret messages based on residual learning, making the whole Network Capture the difference between cover images and stego images. Theoretically, we prove that the residual learning can preserve the weak stego signal for the deep model with any depths. Extensive experiments demonstrate that the proposed Network can detect the state of the art steganography with better accuracy than previous methods when cover images and their stego images are paired in training and testing. We further discuss the proposed method in more general case and analyze the limitation of a CNN model with batch normalization layers for image steganalysis. Empirical validations have demonstrated that the performance of steganography and steganalysis can be improved with appropriate natural image statistical models. Our future work will focus on two aspects: design advanced steganographic algorithms based on CNN models; develop CNN models without batch normalization layers to detect steganography in more general case and further extend them into the compressed domain image.Department of ComputingPh.D., Department of Computing, The Hong Kong Polytechnic University, 2017Doctoratepublished_fina

Yan Liu - One of the best experts on this subject based on the ideXlab platform.

  • ICME - Residual convolution Network based steganalysis with adaptive content suppression
    2017 IEEE International Conference on Multimedia and Expo (ICME), 2017
    Co-Authors: Sheng-hua Zhong, Yan Liu
    Abstract:

    Image steganalysis is to discriminate innocent images and those suspected images with hidden messages. In this paper, we propose a unified Convolutional Neural Network (CNN) model for this task. In order to reliably detect modern steganographic algorithms, we design the proposed model from two aspects. For the first, different from existing CNN based steganalytic algorithms that use a predefined highpass kernel to suppress image content, we integrate the highpass filtering operation into the proposed Network by building a content suppression subNetwork. For the second, we propose a novel sub-Network to actively preserve the weak stego signal generated by secret messages based on residual learning, making the successive Network Capture the difference between cover images and stego images. Extensive experiments demonstrate that the proposed model can detect states-of-the-art steganography with much lower detection error rates than previous methods.

Liu Y - One of the best experts on this subject based on the ideXlab platform.

  • Residual convolution Network based steganalysis with adaptive content suppression
    'Institute of Electrical and Electronics Engineers (IEEE)', 2017
    Co-Authors: Wu S, Sh Zhong, Liu Y
    Abstract:

    Image steganalysis is to discriminate innocent images and those suspected images with hidden messages. In this paper, we propose a unified Convolutional Neural Network (CNN) model for this task. In order to reliably detect modern steganographic algorithms, we design the proposed model from two aspects. For the first, different from existing CNN based steganalytic algorithms that use a predefined highpass kernel to suppress image content, we integrate the highpass filtering operation into the proposed Network by building a content suppression subNetwork. For the second, we propose a novel sub-Network to actively preserve the weak stego signal generated by secret messages based on residual learning, making the successive Network Capture the difference between cover images and stego images. Extensive experiments demonstrate that the proposed model can detect states-of-the-art steganography with much lower detection error rates than previous methods.Department of Computing2017-2018 > Academic research: refereed > Refereed conference paper201802 bcr

Nicolas Prigent - One of the best experts on this subject based on the ideXlab platform.

  • STARLORD: Linked Security Data Exploration in a 3D Graph
    2017
    Co-Authors: Laetitia Leichtnam, Eric Totel, Nicolas Prigent
    Abstract:

    In this paper, we present a novel modelization and visualization approach for heterogeneous sources of data. We represent our data by using a model inspired by STIX. Then, we use clustering algorithms to select interesting information to explore in a visualization panel. The visualization is based on a 3D graph representation that highlights the link between malicious event and allows to focus on relevant security artifacts. We illustrate our approach with two case studies using datasets containing Network Capture of the wannacry attack.

  • VizSEC - STARLORD: Linked security data exploration in a 3D graph
    2017 IEEE Symposium on Visualization for Cyber Security (VizSec), 2017
    Co-Authors: Laetitia Leichtnam, Eric Totel, Nicolas Prigent
    Abstract:

    In this paper, we present a novel model and visualization approach for heterogeneous sources of data. We represent our data by using a model inspired by STIX. Then, we use clustering algorithms to select interesting information to explore in a visualization panel. The visualization is based on a 3D graph representation that highlights the link between malicious event and allows to focus on relevant security artifacts. We illustrate our approach with two case studies using datasets containing Network Capture of the wannacry attack.