Australian Digital Forensics Conference
Document Type
Conference Proceeding
Publisher
Security Research Institute, Edith Cowan University
Place of Publication
Joondalup, Western Australia
Editor(s)
Professor Craig Valli
ISBN
978-0-6481270-9-3
Abstract
Image steganography and steganalysis techniques discussed in the literature rely on using a dataset(s)created based on cover images obtained from the public domain, through the acquisition of images from Internet sources, or manually. This issue often leads to challenges in validating, benchmarking, and reproducing reported techniques in a consistent manner. It is our view that the steganography/steganalysis research community would benefit from the availability of common datasets, thus promoting transparency and academic integrity. In this research, we have considered four aspects: image acquisition, pre-processing, steganographic techniques, and embedding rate in building a dataset for image steganography.
DOI
10.4225/75/5a83a0541d284
Comments
Woolley,, C., Ibrahim, A., & Hannay, P. (2017). Building a dataset for image steganography. Paper presented in Valli, C. (Ed.). The Proceedings of 15th Australian Digital Forensics Conference 5-6 December 2017, Edith Cowan University, Perth, Australia.