Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,156 Hits in 3.2 sec

Content-Adaptive Steganography by Minimizing Statistical Detectability

Vahid Sedighi, Remi Cogranne, Jessica Fridrich
2016 IEEE Transactions on Information Forensics and Security  
Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion.  ...  alternative approach based on a locally-estimated multivariate Gaussian cover image model that is sufficiently simple to derive a closed-form expression for the power of the most powerful detector of content-adaptive  ...  In Sections II-III, we review the MiPOD algorithm by first introducing the statistical model of cover images, the multivariate Gaussian (MVG), deriving the stego image model for content-adaptive Least  ... 
doi:10.1109/tifs.2015.2486744 fatcat:spxlsyvgrzcvpe4mmnmpk7tq3a

Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model

Vahid Sedighi, Jessica Fridrich, Rémi Cogranne, Adnan M. Alattar, Nasir D. Memon, Chad D. Heitzenrater
2015 Media Watermarking, Security, and Forensics 2015  
SPIE 2010 , TIFS 2011 , D(x, y) is very close to the minimum distortion determined by the corresponding rate-distortion bound Distortion is not detectability Distortion is linked to statistical detectability  ...  Average detection error P E for pentary versions of S-UNIWARD, HILL, and MVGG (ν = 2) using maxSRMd2 Simplified flowchart of a typical prior-art content-adaptive steganography Content-Adaptive Pentary  ...  ., EURASIP 2013] where D is the distortion of the corresponding embedding algorithm and x n ± 2 x ∼n denotes the cover image in which only the nth pixel was modified by ±2 Embedding change probability  ... 
doi:10.1117/12.2080272 dblp:conf/mediaforensics/SedighiFC15 fatcat:4cdw5af4czhlnb7cxomgnn6hl4

Practical strategies for content-adaptive batch steganography and pooled steganalysis

Remi Cogranne, Vahid Sedighi, Jessica Fridrich
2017 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)  
Adopting a statistical model for the detector's output, the steganographer minimizes the power of the most powerful detector of an omniscient Warden, while the Warden, informed by the payload spreading  ...  This paper investigates practical strategies for distributing payload across images with content-adaptive steganography and for pooling outputs of a single-image detector for steganalysis.  ...  Replacing the detector output expectation in the optimal LR under H 1 by the estimatesμ i gives us the "estimated LR": Λ B = 1 σ μ B 2 B i=1μ i θ (i) . (6) BATCH EMBEDDING BY MINIMIZING STATISTICAL DETECTABILITY  ... 
doi:10.1109/icassp.2017.7952531 dblp:conf/icassp/CogranneSF17 fatcat:vlwyedwtjbglrfffptebcravda

An Image Steganography Algorithm based on the Quantitative Features of Higher Order Local Model

Hao Huang, Zhiping Zhou
2016 International Journal of Security and Its Applications  
HUGO is the content-based adaptive steganography method for spatial images which can approximately preserve the joint statistic of differences between up to four neighboring pixels in four different directions  ...  In view of the above problem, an improved steganography is proposed. Firstly, by analyzing the higher order local model, the distortion function is defined based on the quantitative MINMAX features.  ...  Acknowledgements This work was supported by the Fundamental Research Funds for the Central Universities (JUSRP51510).  ... 
doi:10.14257/ijsia.2016.10.7.08 fatcat:nyrm5qfs4bczdmwkniuctcv2sy

Steganographic Method of Data Hiding using JPEG Images

2015 International Journal of Science and Research (IJSR)  
Steganography is an art of concealing the fact that communication is taking place, by hiding information in other information.  ...  Different applications may adopt different steganography techniques.  ...  , which leads to less statistical detectability, and hence, more secure steganography.  ... 
doi:10.21275/v4i11.nov151370 fatcat:tg2mesvysjfqhdlzkkadgszqqq

Steganalysis of content-adaptive steganography based on massive datasets pre-classification and feature selection

Jicang Lu, Gang Zhou, Chunfang Yang, Zhenyu Li, Mingjing Lan
2019 IEEE Access  
For current steganalysis of the image content-adaptive steganography, there are multiple problems to be improved, such as high difficulty and low accuracy, when detecting images with various contents and  ...  The experimental results show that the detection accuracy could be improved by the proposed method, and the rationality and availability are also verified.  ...  The rest contents of this paper are arranged as follows: in section II, the limitation on improving the detection accuracy of content-adaptive steganography is presented by analyzing the stego property  ... 
doi:10.1109/access.2019.2896781 fatcat:eitzvefqgve2vfr52cqfkkqlfq

Detection for JPEG steganography based on evolutionary feature selection and classifier ensemble selection

2017 KSII Transactions on Internet and Information Systems  
of the latest content-adaptive JPEG steganography algorithms.  ...  In this paper, a new steganalysis method for content-adaptive JPEG steganography is proposed by integrating the evolutionary feature selection and classifier ensemble selection.  ...  In contrast to non-adaptive steganography, the content-adaptive steganography constrains the embedding changes to edge, texture and noisy regions difficult to model and the embedding noise caused by content-adaptive  ... 
doi:10.3837/tiis.2017.11.023 fatcat:jvabdypz4jgxdijtie3v2vgkia

An Image Spatial Domain Steganography Algorithm with High Payload, Commendable Perceptual Quality and High Statistical Un-detectability

Hao Huang, Zhiping Zhou
2016 International Journal of Security and Its Applications  
statistical un-detectability are considered.  ...  An extensive experimental evaluation has demonstrated the excellent performance of the proposed algorithm compared with other existing image spatial domain steganography algorithms. high statistical un-detectability  ...  Acknowledgments This work was supported by the Fundamental Research Funds for the Central Universities (JUSRP51510).  ... 
doi:10.14257/ijsia.2016.10.9.25 fatcat:s3m4mrwhebab3g6tubzfa4q34e

Selection-channel-aware rich model for Steganalysis of digital images

Tomas Denemark, Vahid Sedighi, Vojtech Holub, Remi Cogranne, Jessica Fridrich
2014 2014 IEEE International Workshop on Information Forensics and Security (WIFS)  
We demonstrate on three state-of-theart content-adaptive steganographic schemes that even an imprecise knowledge of the embedding probabilities can substantially increase the detection accuracy in comparison  ...  Overly adaptive embedding schemes seem to be more vulnerable than schemes that spread the embedding changes more evenly throughout the cover.  ...  All three algorithms follow the paradigm of steganography by minimizing an additive distortion function.  ... 
doi:10.1109/wifs.2014.7084302 dblp:conf/wifs/DenemarkSHCF14 fatcat:55na7fpvinbdjgknv7zdymlote

Detection of content adaptive LSB matching: a game theory approach

Tomáš Denemark, Jessica Fridrich, Adnan M. Alattar, Nasir D. Memon, Chad D. Heitzenrater
2014 Media Watermarking, Security, and Forensics 2014  
In particular, the Warden is ignorant about the embedding probabilities chosen by Alice.  ...  This paper is an attempt to analyze the interaction between Alice and Warden in Steganography using the Game Theory.  ...  INTRODUCTION Content-adaptive steganography constrains its embedding changes to those parts of the image where one expects their detection to be hard(er).  ... 
doi:10.1117/12.2040418 dblp:conf/mediaforensics/DenemarkF14 fatcat:ulwt7dsrlrgklelbpv4jqbcmtu

Multivariate gaussian model for designing additive distortion for steganography

Jessica Fridrich, Jan Kodovsky
2013 2013 IEEE International Conference on Acoustics, Speech and Signal Processing  
The sender specifies the costs of changing each cover element and then embeds a given payload by minimizing the total embedding cost.  ...  Currently, the most successful approach to steganography in empirical objects, such as digital media, is to cast the embedding problem as source coding with a fidelity constraint.  ...  Ideally, they should be defined to minimize the statistical detectability. However, the relationship between costs and statistical detectability is currently not clear.  ... 
doi:10.1109/icassp.2013.6638198 dblp:conf/icassp/FridrichK13 fatcat:kaozls4kozei7o6dlokxdeb55i

Zernike Moment-Based Spatial Image Steganography Resisting Scaling Attack and Statistic Detection

Yue Zhang, Xiangyang Luo, Yanqing Guo, Chuan Qin, Fenlin Liu
2019 IEEE Access  
To solve the above problems, this paper proposes a spatial image adaptive steganography algorithm based on Zernike moment to resist scaling attack and statistic detection.  ...  INDEX TERMS Steganography algorithm, scaling attack, statistic detection, zernike moment.  ...  For anti-detection performance, the current mainstream adaptive steganography algorithms have a high anti-detection performance by the design distortion function.  ... 
doi:10.1109/access.2019.2900286 fatcat:sidgwedoevgt7fjm6o6ev2zvuu

A special detector for the edge adaptive image steganography based on LSB matching revisited

Zhenhao Zhu, Tao Zhang, Baoji Wan
2013 2013 10th IEEE International Conference on Control and Automation (ICCA)  
Based on the analysis of the pixel value difference (PVD) histograms of the cover and stego-images, a special steganalyzer is proposed for the edge adaptive image steganography based on least-significant-bit  ...  The special steganslytic method is designed using the weakness of the EA-LSBMR steganography.  ...  ACKNOWLEDGMENT This work was supported by the National Natural Science Foundation of China (No. 60903221, 61272490) .  ... 
doi:10.1109/icca.2013.6564938 dblp:conf/icca/ZhuZW13 fatcat:kxjojfjb7jghnga4ncac7mf7yi

A Review of Motion Vector-Based Video Steganography

Jun Li, Minqing Zhang, Ke Niu, Xiaoyuan Yang, Yuchuan Luo
2022 Security and Communication Networks  
, and the adaptive MV domain steganography based on the framework of minimizing embedding distortion.  ...  Secondly, according to the different technical characteristics, the MV-based steganography is divided into three categories: the traditional MV domain steganography, the code-based MV domain steganography  ...  Also inspired by the framework of minimizing embedding distortion in image steganography, the third stage of MV-based steganography is mainly based on the adaptive steganography method of this framework  ... 
doi:10.1155/2022/2946812 fatcat:dm4uhnzwcvcpvjdva7vhnz53oi

Moving steganography and steganalysis from the laboratory into the real world

Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomáš Pevný
2013 Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13  
Most published results, including by the authors of this paper, apply "in laboratory conditions" and some are heavily hedged by assumptions and caveats; significant challenges remain unsolved in order  ...  With a few exceptions, such papers address abstractions of the hiding and detection problems, which arguably have become disconnected from the real world.  ...  Cogranne is funded by Troyes University of Technology (UTT) strategic program COLUMBO. The work of T. Pevný is also supported by the Grant Agency of Czech Republic under the project P103/12/P514.  ... 
doi:10.1145/2482513.2482965 dblp:conf/ih/KerBBCCFFP13 fatcat:pdf3gedtzre6vg33kkeu6nm3oq
« Previous Showing results 1 — 15 out of 1,156 results