A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hybrid Adaptive Video Steganography Scheme under Game Model
2019
IEEE Access
INDEX TERMS Video steganography, game theory model, hybrid adaptive, H.264 encoding. ...
A hybrid steganography model that satisfies the Kerckhoffs principle by combining the strategy adaptation of the game theory model and the content adaptation in the cover model is proposed. ...
In theory, an information hiding model named ''Strategic adaptive'' based on game theory is proposed. ...
doi:10.1109/access.2019.2902464
fatcat:tfg7tlt4mzfq5nzrj367ep46cy
A Game-Theoretic Approach to Content-Adaptive Steganography
[chapter]
2013
Lecture Notes in Computer Science
We devise a game-theoretic model for the whole process including cover generation, adaptive embedding, and a detector which anticipates the adaptivity. ...
We propose a framework for content-adaptive embedding in the case of imperfect steganography. It formally defines heterogeneity within the cover as a necessary condition for adaptive embedding. ...
The second author thanks Andrew Ker for useful discussions on game theory and steganography in general. ...
doi:10.1007/978-3-642-36373-3_9
fatcat:noq7tpsnpncmhcxzvaaglnyfoy
Adaptive steganography by oracle (ASO)
2013
2013 IEEE International Conference on Multimedia and Expo (ICME)
Position with game theory aspects. pixel (±1) : ρ = min (ρ i (+) , ρ i(-) ).
The Oracle is trained with the best state of the art algorithm, witch is HUGO [1]. ...
A new adaptive embedding scheme based an oracle (ASO). A new paradigm witch is the steganography by database. The proposed method scales well with dimension. ...
doi:10.1109/icme.2013.6607427
dblp:conf/icmcs/KouiderCP13
fatcat:jdspigyt35ahtdecgat3cu3qb4
Adaptive Steganography Based on bargain Game
[article]
2022
arXiv
pre-print
In the third step, regarding the bargaining method in game theory, each block plays the role of a player, that the competition between players is based on the defined goal function, and in the best blocks ...
The capacity and security of the confidential message on the channel are two important challenges in steganography. ...
Related work Pascal and Rainer [9] used the adaptive steganography to introduce a new game-theoretic framework while taking the knowledge of the steganalysis into account. ...
arXiv:2111.04653v2
fatcat:56wyqk2wvvggbh6esjpj2w6tuu
A multi-image hiding technique in dilated video regions based on cooperative game-theoretic approach
2021
Journal of King Saud University: Computer and Information Sciences
This paper presents a cooperative game theory approach to design an optimal video steganography framework. ...
This paper proposes a novel game-theoretic approach using strategy adaption to address this issue. ...
Similarly, Schottle and Bohme (2016) proposed content-adaptive-based video steganography using game theory. The work utilizes a game-theoretic model to study the contents from the cover data. ...
doi:10.1016/j.jksuci.2021.05.018
fatcat:yzdxpqg4xvhjpbivv4h6b2jswu
A Game-Theoretic Analysis Of Content-Adaptive Steganography With Independent Embedding
2013
Zenodo
The first and last authors would like to thank the German National Science Foundation (DFG) under grant "Sichere adaptive Steganographie", and the second author would like to thank the Campus Hungary Program ...
RELATED WORK The combination of steganography and game theory dates back to 1998 [6] ; while the combination of game theory and content-adaptive steganography is more recent, with the first such study ...
Game Theory Enter game theory: the study of strategic choices and their consequences. We consider a two-player game between Alice, the steganographer, and Eve, the steganalyst. ...
doi:10.5281/zenodo.43653
fatcat:a4zw6z6ihrbphi7yhim7yndne4
Adaptive Spatial Steganography Based on the Correlation of Wavelet Coefficients for Digital Images in Spatial Domain
2016
DEStech Transactions on Engineering and Technology Research
How to define the pixel's embedding distortion is a key problem of image adaptive steganography. ...
This paper proposes an adaptive spatial steganography in spatial domain based on the correlation of wavelet coefficients for digital images according to the principle of minimizing a suitable defined distortion ...
Since the knowledge of game theory can be well utilized in the image steganography, we will try to generalize the cost function by game theory in our future work. , embedding a random sequence of bits ...
doi:10.12783/dtetr/iect2016/3718
fatcat:zocxhmixdrhzhapind2dsbr6ky
Where to Hide the Bits ?
[chapter]
2012
Lecture Notes in Computer Science
We present a stochastic two-player zero-sum game between defender and attacker related to the security of practical steganography. ...
The defender knows the predictability exactly and chooses k embedding positions. ...
This research has received funding from the German national science foundation (DFG) under grant "Sichere adaptive Steganographie". ...
doi:10.1007/978-3-642-34266-0_1
fatcat:g3ua73vvebh3hk5xmdtukiycwa
Detection of content adaptive LSB matching: a game theory approach
2014
Media Watermarking, Security, and Forensics 2014
This paper is an attempt to analyze the interaction between Alice and Warden in Steganography using the Game Theory. ...
The first game-theoretic approach to steganography appeared in [14] . † This is how essentially all current most secure steganographic schemes for empirical covers 15 work. ...
introduced the Game Theory as a possible framework to incorporate Warden's ignorance in Steganography. * In this article, we investigate this intriguing research direction for the modern embedding paradigm ...
doi:10.1117/12.2040418
dblp:conf/mediaforensics/DenemarkF14
fatcat:ulwt7dsrlrgklelbpv4jqbcmtu
Moving steganography and steganalysis from the laboratory into the real world
2013
Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13
to implement good steganography and steganalysis in practice. ...
There has been an explosion of academic literature on steganography and steganalysis in the past two decades. ...
Ker and T. Pevný is supported by European Office of Aerospace Research and Development under the research grant numbers FA8655-11-3035 and FA8655-13-1-3020, respectively. The work of S. Craver and J. ...
doi:10.1145/2482513.2482965
dblp:conf/ih/KerBBCCFFP13
fatcat:pdf3gedtzre6vg33kkeu6nm3oq
Synchronized Detection and Recovery of Steganographic Messages with Adversarial Learning
[article]
2019
arXiv
pre-print
In the game, the generator and discriminator attempt to communicate with each other using secret messages hidden in an image. ...
, discriminator and steganalyzer. ...
Adversarial learning is based on the game theory, and is combined with unsupervised way to jointly train the model. ...
arXiv:1801.10365v3
fatcat:kbhhfec6eza6xjurmummdzl56q
SSGAN: Secure Steganography Based on Generative Adversarial Networks
[chapter]
2018
Lecture Notes in Computer Science
In this paper, a novel strategy of Secure Steganograpy based on Generative Adversarial Networks is proposed to generate suitable and secure covers for steganography. ...
The generative network mainly evaluates the visual quality of the generated images for steganography, and the discriminative networks are utilized to assess their suitableness for information hiding. ...
In Section 5, we draw conclusions.
2 Secure Steganography Based on Generative Adversarial Networks
Adversarial Learning Adversarial learning using game theory, and is combined with unsupervised way ...
doi:10.1007/978-3-319-77380-3_51
fatcat:rjtxx7bujja37a5lan3dyubcvi
Adaptive Steganography and Steganalysis with Fixed-Size Embedding
[chapter]
2015
Lecture Notes in Computer Science
We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, Eve. ...
In this game, Alice wants to hide a secret message of length k in a binary sequence, and Eve wants to detect whether a secret message is present. ...
The second author's research visit at Penn State was supported under Visiting Scientists Grant N62909-13-1-V029 by the Office of Naval Research (ONR), and the third author's research visit at Penn State ...
doi:10.1007/978-3-662-46739-8_5
fatcat:zoomxhnitfb5ph5ju7vtrilazy
SSGAN: Secure Steganography Based on Generative Adversarial Networks
[article]
2018
arXiv
pre-print
In this paper, a novel strategy of Secure Steganograpy based on Generative Adversarial Networks is proposed to generate suitable and secure covers for steganography. ...
The generative network mainly evaluates the visual quality of the generated images for steganography, and the discriminative networks are utilized to assess their suitableness for information hiding. ...
In Section 5, we draw conclusions.
2 Secure Steganography Based on Generative Adversarial Networks
Adversarial Learning Adversarial learning using game theory, and is combined with unsupervised way ...
arXiv:1707.01613v4
fatcat:6ueu5pv5dbec5nfgf7z4upkgbi
Game-theoretic Analysis to Content-adaptive Reversible Watermarking
[article]
2019
arXiv
pre-print
While many games were designed for steganography and robust watermarking, few focused on reversible watermarking. ...
We investigate non-cooperative game and cooperative game between Alice and Bob. ...
The first work combining game theory and steganography was probably proposed by Ettinger [8] . ...
arXiv:1905.01674v1
fatcat:mr2gzriakrc27cnyqeqkl732cm
« Previous
Showing results 1 — 15 out of 517 results