A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Content-Adaptive Steganography by Minimizing Statistical Detectability
2016
IEEE Transactions on Information Forensics and Security
Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. ...
alternative approach based on a locally-estimated multivariate Gaussian cover image model that is sufficiently simple to derive a closed-form expression for the power of the most powerful detector of content-adaptive ...
In Sections II-III, we review the MiPOD algorithm by first introducing the statistical model of cover images, the multivariate Gaussian (MVG), deriving the stego image model for content-adaptive Least ...
doi:10.1109/tifs.2015.2486744
fatcat:spxlsyvgrzcvpe4mmnmpk7tq3a
Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model
2015
Media Watermarking, Security, and Forensics 2015
SPIE 2010 , TIFS 2011 , D(x, y) is very close to the minimum distortion determined by the corresponding rate-distortion bound
Distortion is not detectability Distortion is linked to statistical detectability ...
Average detection error P E for pentary versions of S-UNIWARD, HILL, and MVGG (ν = 2) using maxSRMd2
Simplified flowchart of a typical prior-art content-adaptive steganography Content-Adaptive Pentary ...
., EURASIP 2013] where D is the distortion of the corresponding embedding algorithm and x n ± 2 x ∼n denotes the cover image in which only the nth pixel was modified by ±2 Embedding change probability ...
doi:10.1117/12.2080272
dblp:conf/mediaforensics/SedighiFC15
fatcat:4cdw5af4czhlnb7cxomgnn6hl4
Practical strategies for content-adaptive batch steganography and pooled steganalysis
2017
2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Adopting a statistical model for the detector's output, the steganographer minimizes the power of the most powerful detector of an omniscient Warden, while the Warden, informed by the payload spreading ...
This paper investigates practical strategies for distributing payload across images with content-adaptive steganography and for pooling outputs of a single-image detector for steganalysis. ...
Replacing the detector output expectation in the optimal LR under H 1 by the estimatesμ i gives us the "estimated LR": Λ B = 1 σ μ B 2 B i=1μ i θ (i) . (6)
BATCH EMBEDDING BY MINIMIZING STATISTICAL DETECTABILITY ...
doi:10.1109/icassp.2017.7952531
dblp:conf/icassp/CogranneSF17
fatcat:vlwyedwtjbglrfffptebcravda
An Image Steganography Algorithm based on the Quantitative Features of Higher Order Local Model
2016
International Journal of Security and Its Applications
HUGO is the content-based adaptive steganography method for spatial images which can approximately preserve the joint statistic of differences between up to four neighboring pixels in four different directions ...
In view of the above problem, an improved steganography is proposed. Firstly, by analyzing the higher order local model, the distortion function is defined based on the quantitative MINMAX features. ...
Acknowledgements This work was supported by the Fundamental Research Funds for the Central Universities (JUSRP51510). ...
doi:10.14257/ijsia.2016.10.7.08
fatcat:nyrm5qfs4bczdmwkniuctcv2sy
Steganographic Method of Data Hiding using JPEG Images
2015
International Journal of Science and Research (IJSR)
Steganography is an art of concealing the fact that communication is taking place, by hiding information in other information. ...
Different applications may adopt different steganography techniques. ...
, which leads to less statistical detectability, and hence, more secure steganography. ...
doi:10.21275/v4i11.nov151370
fatcat:tg2mesvysjfqhdlzkkadgszqqq
Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection
2019
IEEE Access
For current steganalysis of the image content-adaptive steganography, there are multiple problems to be improved, such as high difficulty and low accuracy, when detecting images with various contents and ...
The experimental results show that the detection accuracy could be improved by the proposed method, and the rationality and availability are also verified. ...
The rest contents of this paper are arranged as follows: in section II, the limitation on improving the detection accuracy of content-adaptive steganography is presented by analyzing the stego property ...
doi:10.1109/access.2019.2896781
fatcat:eitzvefqgve2vfr52cqfkkqlfq
Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection
2017
KSII Transactions on Internet and Information Systems
of the latest content-adaptive JPEG steganography algorithms. ...
In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection. ...
In contrast to non-adaptive steganography, the content-adaptive steganography constrains the embedding changes to edge, texture and noisy regions difficult to model and the embedding noise caused by content-adaptive ...
doi:10.3837/tiis.2017.11.023
fatcat:jvabdypz4jgxdijtie3v2vgkia
An Image Spatial Domain Steganography Algorithm with High Payload, Commendable Perceptual Quality and High Statistical Un-detectability
2016
International Journal of Security and Its Applications
statistical un-detectability are considered. ...
An extensive experimental evaluation has demonstrated the excellent performance of the proposed algorithm compared with other existing image spatial domain steganography algorithms. high statistical un-detectability ...
Acknowledgments This work was supported by the Fundamental Research Funds for the Central Universities (JUSRP51510). ...
doi:10.14257/ijsia.2016.10.9.25
fatcat:s3m4mrwhebab3g6tubzfa4q34e
Selection-channel-aware rich model for Steganalysis of digital images
2014
2014 IEEE International Workshop on Information Forensics and Security (WIFS)
We demonstrate on three state-of-theart content-adaptive steganographic schemes that even an imprecise knowledge of the embedding probabilities can substantially increase the detection accuracy in comparison ...
Overly adaptive embedding schemes seem to be more vulnerable than schemes that spread the embedding changes more evenly throughout the cover. ...
All three algorithms follow the paradigm of steganography by minimizing an additive distortion function. ...
doi:10.1109/wifs.2014.7084302
dblp:conf/wifs/DenemarkSHCF14
fatcat:55na7fpvinbdjgknv7zdymlote
Detection of content adaptive LSB matching: a game theory approach
2014
Media Watermarking, Security, and Forensics 2014
In particular, the Warden is ignorant about the embedding probabilities chosen by Alice. ...
This paper is an attempt to analyze the interaction between Alice and Warden in Steganography using the Game Theory. ...
INTRODUCTION Content-adaptive steganography constrains its embedding changes to those parts of the image where one expects their detection to be hard(er). ...
doi:10.1117/12.2040418
dblp:conf/mediaforensics/DenemarkF14
fatcat:ulwt7dsrlrgklelbpv4jqbcmtu
Multivariate gaussian model for designing additive distortion for steganography
2013
2013 IEEE International Conference on Acoustics, Speech and Signal Processing
The sender specifies the costs of changing each cover element and then embeds a given payload by minimizing the total embedding cost. ...
Currently, the most successful approach to steganography in empirical objects, such as digital media, is to cast the embedding problem as source coding with a fidelity constraint. ...
Ideally, they should be defined to minimize the statistical detectability. However, the relationship between costs and statistical detectability is currently not clear. ...
doi:10.1109/icassp.2013.6638198
dblp:conf/icassp/FridrichK13
fatcat:kaozls4kozei7o6dlokxdeb55i
Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection
2019
IEEE Access
To solve the above problems, this paper proposes a spatial image adaptive steganography algorithm based on Zernike moment to resist scaling attack and statistic detection. ...
INDEX TERMS Steganography algorithm, scaling attack, statistic detection, zernike moment. ...
For anti-detection performance, the current mainstream adaptive steganography algorithms have a high anti-detection performance by the design distortion function. ...
doi:10.1109/access.2019.2900286
fatcat:sidgwedoevgt7fjm6o6ev2zvuu
A special detector for the edge adaptive image steganography based on LSB matching revisited
2013
2013 10th IEEE International Conference on Control and Automation (ICCA)
Based on the analysis of the pixel value difference (PVD) histograms of the cover and stego-images, a special steganalyzer is proposed for the edge adaptive image steganography based on least-significant-bit ...
The special steganslytic method is designed using the weakness of the EA-LSBMR steganography. ...
ACKNOWLEDGMENT This work was supported by the National Natural Science Foundation of China (No. 60903221, 61272490) . ...
doi:10.1109/icca.2013.6564938
dblp:conf/icca/ZhuZW13
fatcat:kxjojfjb7jghnga4ncac7mf7yi
A Review of Motion Vector-Based Video Steganography
2022
Security and Communication Networks
, and the adaptive MV domain steganography based on the framework of minimizing embedding distortion. ...
Secondly, according to the different technical characteristics, the MV-based steganography is divided into three categories: the traditional MV domain steganography, the code-based MV domain steganography ...
Also inspired by the framework of minimizing embedding distortion in image steganography, the third stage of MV-based steganography is mainly based on the adaptive steganography method of this framework ...
doi:10.1155/2022/2946812
fatcat:dm4uhnzwcvcpvjdva7vhnz53oi
Moving steganography and steganalysis from the laboratory into the real world
2013
Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13
Most published results, including by the authors of this paper, apply "in laboratory conditions" and some are heavily hedged by assumptions and caveats; significant challenges remain unsolved in order ...
With a few exceptions, such papers address abstractions of the hiding and detection problems, which arguably have become disconnected from the real world. ...
Cogranne is funded by Troyes University of Technology (UTT) strategic program COLUMBO. The work of T. Pevný is also supported by the Grant Agency of Czech Republic under the project P103/12/P514. ...
doi:10.1145/2482513.2482965
dblp:conf/ih/KerBBCCFFP13
fatcat:pdf3gedtzre6vg33kkeu6nm3oq
« Previous
Showing results 1 — 15 out of 1,156 results