JOURNAL ARTICLE

DCT-based cyber defense techniques

Yaron AmsalemAnton PuzanovAnton BedinermanMaxim KutcherOfer Hadar

Year: 2015 Journal:   Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE Vol: 9599 Pages: 95991F-95991F   Publisher: SPIE

Abstract

With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

Keywords:
Computer science Discrete cosine transform Steganography JPEG Computer security Digital watermarking Popularity Multimedia Artificial intelligence Data compression Image (mathematics)

Metrics

3
Cited By
0.00
FWCI (Field Weighted Citation Impact)
19
Refs
0.09
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Soft Computing Techniques in Cyber Defense

Dinesh KumarSainiVikas Singh

Journal:   International Journal of Computer Applications Year: 2012 Vol: 50 (20)Pages: 17-22
BOOK-CHAPTER

Active Defense Techniques for Enhancing Cyber Resilience

Nathaniel EvansAaron Werth

Risk, systems and decisions Year: 2025 Pages: 277-307
JOURNAL ARTICLE

Advanced Cyber Defense: Machine Learning Techniques with TensorFlow

Dr. Amit Sharma

Journal:   Zenodo (CERN European Organization for Nuclear Research) Year: 2024
© 2026 ScienceGate Book Chapters — All rights reserved.