Mitigating the Insider Threat with High-Dimensional Anomaly Detection

Author(s):  
S. Pramanick ◽  
S. Rajagopalan ◽  
Eric van den Berg
2021 ◽  
Author(s):  
NaanKang Garba ◽  
Sandip Rakshit ◽  
Chai Dakun Maa ◽  
Narasimha Rao Vajjhala

Author(s):  
Hemalatha Jeyaprakash ◽  
KavithaDevi M. K. ◽  
Geetha S.

In recent years, steganalyzers are intelligently detecting the stego images with high detection rate using high dimensional cover representation. And so the steganographers are working towards this issue to protect the cover element dependency and to protect the detection of hiding secret messages. Any steganalysis algorithm may achieve its success in two ways: 1) extracting the most sensitive features to expose the footprints of message hiding; 2) designing or building an effective classifier engine to favorably detect the stego images through learning all the stego sensitive features. In this chapter, the authors improve the stego anomaly detection using the second approach. This chapter presents a comparative review of application of the machine learning tools for steganalysis problem and recommends the best classifier that produces a superior detection rate.


2021 ◽  
pp. 444-454
Author(s):  
Liu Weiwei ◽  
Lei Shuya ◽  
Zheng Xiaokun ◽  
Li Han ◽  
Wang Xinyu ◽  
...  

2020 ◽  
Vol 31 (1-2) ◽  
Author(s):  
Francesco Verdoja ◽  
Marco Grangetto

Abstract Reed–Xiaoli detector (RXD) is recognized as the benchmark algorithm for image anomaly detection; however, it presents known limitations, namely the dependence over the image following a multivariate Gaussian model, the estimation and inversion of a high-dimensional covariance matrix, and the inability to effectively include spatial awareness in its evaluation. In this work, a novel graph-based solution to the image anomaly detection problem is proposed; leveraging the graph Fourier transform, we are able to overcome some of RXD’s limitations while reducing computational cost at the same time. Tests over both hyperspectral and medical images, using both synthetic and real anomalies, prove the proposed technique is able to obtain significant gains over performance by other algorithms in the state of the art.


Sign in / Sign up

Export Citation Format

Share Document