Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








517 Hits in 2.3 sec

Hybrid Adaptive Video Steganography Scheme under Game Model

Ke Niu, Jun Li, XiaoYuan Yang, Shuo Zhang, Bo Wang
2019 IEEE Access  
INDEX TERMS Video steganography, game theory model, hybrid adaptive, H.264 encoding.  ...  A hybrid steganography model that satisfies the Kerckhoffs principle by combining the strategy adaptation of the game theory model and the content adaptation in the cover model is proposed.  ...  In theory, an information hiding model named ''Strategic adaptive'' based on game theory is proposed.  ... 
doi:10.1109/access.2019.2902464 fatcat:tfg7tlt4mzfq5nzrj367ep46cy

A Game-Theoretic Approach to Content-Adaptive Steganography [chapter]

Pascal Schöttle, Rainer Böhme
2013 Lecture Notes in Computer Science  
We devise a game-theoretic model for the whole process including cover generation, adaptive embedding, and a detector which anticipates the adaptivity.  ...  We propose a framework for content-adaptive embedding in the case of imperfect steganography. It formally defines heterogeneity within the cover as a necessary condition for adaptive embedding.  ...  The second author thanks Andrew Ker for useful discussions on game theory and steganography in general.  ... 
doi:10.1007/978-3-642-36373-3_9 fatcat:noq7tpsnpncmhcxzvaaglnyfoy

Adaptive steganography by oracle (ASO)

Sarra Kouider, Marc Chaumont, William Puech
2013 2013 IEEE International Conference on Multimedia and Expo (ICME)  
Position with game theory aspects. pixel (±1) : ρ = min (ρ i (+) , ρ i(-) ). The Oracle is trained with the best state of the art algorithm, witch is HUGO [1].  ...  A new adaptive embedding scheme based an oracle (ASO). A new paradigm witch is the steganography by database. The proposed method scales well with dimension.  ... 
doi:10.1109/icme.2013.6607427 dblp:conf/icmcs/KouiderCP13 fatcat:jdspigyt35ahtdecgat3cu3qb4

Adaptive Steganography Based on bargain Game [article]

Behbod Keshavarzi, Hamidreza Navidi, Parvaneh Asghari, Seyyed Hamid Haji Seyyed Javadi
2022 arXiv   pre-print
In the third step, regarding the bargaining method in game theory, each block plays the role of a player, that the competition between players is based on the defined goal function, and in the best blocks  ...  The capacity and security of the confidential message on the channel are two important challenges in steganography.  ...  Related work Pascal and Rainer [9] used the adaptive steganography to introduce a new game-theoretic framework while taking the knowledge of the steganalysis into account.  ... 
arXiv:2111.04653v2 fatcat:56wyqk2wvvggbh6esjpj2w6tuu

A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach

Suganthi Kumar, Rajkumar Soundrapandiyan
2021 Journal of King Saud University: Computer and Information Sciences  
This paper presents a cooperative game theory approach to design an optimal video steganography framework.  ...  This paper proposes a novel game-theoretic approach using strategy adaption to address this issue.  ...  Similarly, Schottle and Bohme (2016) proposed content-adaptive-based video steganography using game theory. The work utilizes a game-theoretic model to study the contents from the cover data.  ... 
doi:10.1016/j.jksuci.2021.05.018 fatcat:yzdxpqg4xvhjpbivv4h6b2jswu

A Game-Theoretic Analysis Of Content-Adaptive Steganography With Independent Embedding

Rainer Boehme, Jens Grossklags, Benjamin Johnson, Aron Laszka, Pascal Schoettle
2013 Zenodo  
The first and last authors would like to thank the German National Science Foundation (DFG) under grant "Sichere adaptive Steganographie", and the second author would like to thank the Campus Hungary Program  ...  RELATED WORK The combination of steganography and game theory dates back to 1998 [6] ; while the combination of game theory and content-adaptive steganography is more recent, with the first such study  ...  Game Theory Enter game theory: the study of strategic choices and their consequences. We consider a two-player game between Alice, the steganographer, and Eve, the steganalyst.  ... 
doi:10.5281/zenodo.43653 fatcat:a4zw6z6ihrbphi7yhim7yndne4

Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain

Ningbo Li, Pan Feng, Liu Jia
2016 DEStech Transactions on Engineering and Technology Research  
How to define the pixel's embedding distortion is a key problem of image adaptive steganography.  ...  This paper proposes an adaptive spatial steganography in spatial domain based on the correlation of wavelet coefficients for digital images according to the principle of minimizing a suitable defined distortion  ...  Since the knowledge of game theory can be well utilized in the image steganography, we will try to generalize the cost function by game theory in our future work.  , embedding a random sequence of bits  ... 
doi:10.12783/dtetr/iect2016/3718 fatcat:zocxhmixdrhzhapind2dsbr6ky

Where to Hide the Bits ? [chapter]

Benjamin Johnson, Pascal Schöttle, Rainer Böhme
2012 Lecture Notes in Computer Science  
We present a stochastic two-player zero-sum game between defender and attacker related to the security of practical steganography.  ...  The defender knows the predictability exactly and chooses k embedding positions.  ...  This research has received funding from the German national science foundation (DFG) under grant "Sichere adaptive Steganographie".  ... 
doi:10.1007/978-3-642-34266-0_1 fatcat:g3ua73vvebh3hk5xmdtukiycwa

Detection of content adaptive LSB matching: a game theory approach

Tomáš Denemark, Jessica Fridrich, Adnan M. Alattar, Nasir D. Memon, Chad D. Heitzenrater
2014 Media Watermarking, Security, and Forensics 2014  
This paper is an attempt to analyze the interaction between Alice and Warden in Steganography using the Game Theory.  ...  The first game-theoretic approach to steganography appeared in [14] . † This is how essentially all current most secure steganographic schemes for empirical covers 15 work.  ...  introduced the Game Theory as a possible framework to incorporate Warden's ignorance in Steganography. * In this article, we investigate this intriguing research direction for the modern embedding paradigm  ... 
doi:10.1117/12.2040418 dblp:conf/mediaforensics/DenemarkF14 fatcat:ulwt7dsrlrgklelbpv4jqbcmtu

Moving steganography and steganalysis from the laboratory into the real world

Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomáš Pevný
2013 Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13  
to implement good steganography and steganalysis in practice.  ...  There has been an explosion of academic literature on steganography and steganalysis in the past two decades.  ...  Ker and T. Pevný is supported by European Office of Aerospace Research and Development under the research grant numbers FA8655-11-3035 and FA8655-13-1-3020, respectively. The work of S. Craver and J.  ... 
doi:10.1145/2482513.2482965 dblp:conf/ih/KerBBCCFFP13 fatcat:pdf3gedtzre6vg33kkeu6nm3oq

Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning [article]

Haichao Shi, Xiao-Yu Zhang
2019 arXiv   pre-print
In the game, the generator and discriminator attempt to communicate with each other using secret messages hidden in an image.  ...  , discriminator and steganalyzer.  ...  Adversarial learning is based on the game theory, and is combined with unsupervised way to jointly train the model.  ... 
arXiv:1801.10365v3 fatcat:kbhhfec6eza6xjurmummdzl56q

SSGAN: Secure Steganography Based on Generative Adversarial Networks [chapter]

Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiaoyu Zhang
2018 Lecture Notes in Computer Science  
In this paper, a novel strategy of Secure Steganograpy based on Generative Adversarial Networks is proposed to generate suitable and secure covers for steganography.  ...  The generative network mainly evaluates the visual quality of the generated images for steganography, and the discriminative networks are utilized to assess their suitableness for information hiding.  ...  In Section 5, we draw conclusions. 2 Secure Steganography Based on Generative Adversarial Networks Adversarial Learning Adversarial learning using game theory, and is combined with unsupervised way  ... 
doi:10.1007/978-3-319-77380-3_51 fatcat:rjtxx7bujja37a5lan3dyubcvi

Adaptive Steganography and Steganalysis with Fixed-Size Embedding [chapter]

Benjamin Johnson, Pascal Schöttle, Aron Laszka, Jens Grossklags, Rainer Böhme
2015 Lecture Notes in Computer Science  
We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, Eve.  ...  In this game, Alice wants to hide a secret message of length k in a binary sequence, and Eve wants to detect whether a secret message is present.  ...  The second author's research visit at Penn State was supported under Visiting Scientists Grant N62909-13-1-V029 by the Office of Naval Research (ONR), and the third author's research visit at Penn State  ... 
doi:10.1007/978-3-662-46739-8_5 fatcat:zoomxhnitfb5ph5ju7vtrilazy

SSGAN: Secure Steganography Based on Generative Adversarial Networks [article]

Haichao Shi, Jing Dong, Wei Wang, Yinlong Qian, Xiaoyu Zhang
2018 arXiv   pre-print
In this paper, a novel strategy of Secure Steganograpy based on Generative Adversarial Networks is proposed to generate suitable and secure covers for steganography.  ...  The generative network mainly evaluates the visual quality of the generated images for steganography, and the discriminative networks are utilized to assess their suitableness for information hiding.  ...  In Section 5, we draw conclusions. 2 Secure Steganography Based on Generative Adversarial Networks Adversarial Learning Adversarial learning using game theory, and is combined with unsupervised way  ... 
arXiv:1707.01613v4 fatcat:6ueu5pv5dbec5nfgf7z4upkgbi

Game-theoretic Analysis to Content-adaptive Reversible Watermarking [article]

Hanzhou Wu, Xinpeng Zhang
2019 arXiv   pre-print
While many games were designed for steganography and robust watermarking, few focused on reversible watermarking.  ...  We investigate non-cooperative game and cooperative game between Alice and Bob.  ...  The first work combining game theory and steganography was probably proposed by Ettinger [8] .  ... 
arXiv:1905.01674v1 fatcat:mr2gzriakrc27cnyqeqkl732cm
« Previous Showing results 1 — 15 out of 517 results