dc.contributor.advisor | Kalyan Veeramachaneni. | en_US |
dc.contributor.author | Nene, Ajinkya Kishore. | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. | en_US |
dc.date.accessioned | 2020-09-15T21:59:22Z | |
dc.date.available | 2020-09-15T21:59:22Z | |
dc.date.copyright | 2020 | en_US |
dc.date.issued | 2020 | en_US |
dc.identifier.uri | https://hdl.handle.net/1721.1/127469 | |
dc.description | Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020 | en_US |
dc.description | Cataloged from the official PDF of thesis. | en_US |
dc.description | Includes bibliographical references (pages 121-125). | en_US |
dc.description.abstract | Steganography is the process of hiding data inside of files while steganalysis is the process of detecting the presence of hidden data inside of files. As a concealment system, steganography is effective at safeguarding the privacy and security of information. Due to its effectiveness as a concealment system, bad actors have increasingly begun using steganography to transmit exploits or other malicious information. Steganography thus poses a significant security risk, demanding serious attention and emphasizing a need for universal and practical steganalysis models that can defend against steganography-based attack vectors. In this thesis, we provide a comprehensive review of steganography-enabled exploits and design a robust framework for universal and practical deep-learning steganalysis. As part of our framework, we provide new and practical steganalysis architectures, propose several data augmentation techniques which includes a novel adversarial-attack system, and develop a python library, StegBench, to enable dynamic and robust steganalysis evaluation. Altogether, our framework enables the development of practical and universal steganalysis models that can be used robustly in security applications to neutralize steganography-based threat models. | en_US |
dc.description.statementofresponsibility | by Ajinkya Kishore Nene. | en_US |
dc.format.extent | 125 pages | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Massachusetts Institute of Technology | en_US |
dc.rights | MIT theses may be protected by copyright. Please reuse MIT thesis content according to the MIT Libraries Permissions Policy, which is available through the URL provided. | en_US |
dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
dc.subject | Electrical Engineering and Computer Science. | en_US |
dc.title | Deep learning approaches to universal and practical steganalysis | en_US |
dc.type | Thesis | en_US |
dc.description.degree | M. Eng. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.identifier.oclc | 1192967135 | en_US |
dc.description.collection | M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science | en_US |
dspace.imported | 2020-09-15T21:59:22Z | en_US |
mit.thesis.degree | Master | en_US |
mit.thesis.department | EECS | en_US |