A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Steganography With Multiple JPEG Images of the Same Scene
2017
IEEE Transactions on Information Forensics and Security
security with relevance steganography utilizing one JPEG image. ...
During this paper, we have a tendency to investigate another style of side-informationa group of multiple JPEG pictures of identical scenefor applications once the sender doesn't have access to a precover ...
In this case, Alice can utilize a different type of side-informationshe can take multiple JPEG images of the same scene. ...
doi:10.1109/tifs.2017.2705625
fatcat:62rmlt4xcvdovkcto3qxy3f7ly
JPEG Image Steganography based on Coefficients Selection and Partition
2017
International Journal of Image Graphics and Signal Processing
In this paper, we propose a novel JPEG image Steganography algorithm based on partition schemes on image coefficient values. ...
Our method selects the AC and DC coefficients of a JPEG image according to a channel selection method and then identifies appropriate coefficients to store the secret data-bits. ...
PSNR comparisons of the proposed algorithm with other JPEG Steganography methods.Fig.6. Output stego image results of Lena for different values of ER and ECCI. ...
doi:10.5815/ijigsp.2017.06.02
fatcat:s72soavomfgaflypmi4lesc4bu
StegoAppDB: a Steganography Apps Forensics Image Database
2019
IS&T International Symposium on Electronic Imaging Science and Technology
We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats. ...
We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats. ...
Acknowledgement We are grateful to the following undergraduate students for helping us acquire images for our database: Yiqiu Qian; Joseph Bingham; Chase Webb; and Mingming Yue. ...
doi:10.2352/issn.2470-1173.2019.5.mwsf-536
fatcat:oan6zhemgvditkhszpc4ppthhu
StegoAppDB: a Steganography Apps Forensics Image Database
[article]
2019
arXiv
pre-print
We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats. ...
StegoAppDB, a steganography apps forensics image database, contains over 810,000 innocent and stego images using a minimum of 10 different phone models from 24 distinct devices, with detailed provenanced ...
Acknowledgement We are grateful to the following undergraduate students for helping us acquire images for our database: Yiqiu Qian; Joseph Bingham; Chase Webb; and Mingming Yue. ...
arXiv:1904.09360v1
fatcat:rh36axyrozaixf5254e5uynfmy
Study of Effect of DCT Domain Steganography Techniques in Spatial Domain for JPEG Images Steganalysis
2015
International Journal of Computer Applications
A set of feature is identified for the analysis of covert communication through the image. ...
Steganography is a technique of hiding secret data into digital images in different domain like frequency, spatial or wavelet. ...
The spatial domain image is said to have a normal image space, which means that each image element at location ℓ in image I is a projection at the same location in scene S. ...
doi:10.5120/ijca2015906396
fatcat:saazhpmhbjea3d3idckkbmncna
Model Based Steganography with Precover
2017
IS&T International Symposium on Electronic Imaging Science and Technology
Experiments with uncompressed and JPEG images show promise of this theoretically well-founded approach. ...
It is widely recognized that steganography with sideinformation in the form of a precover at the sender enjoys significantly higher empirical security than other embedding schemes. ...
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of AFOSR or the U.S. ...
doi:10.2352/issn.2470-1173.2017.7.mwsf-326
fatcat:6ddcyk2yrvh6notewtu3gjnybi
StegaNeRF: Embedding Invisible Information within Neural Radiance Fields
[article]
2022
arXiv
pre-print
StegaNeRF signifies an initial exploration into the novel problem of instilling customizable, imperceptible, and recoverable information to NeRF renderings, with minimal impact to rendered images. ...
However, while common visual data (images and videos) have standard approaches to embed ownership or copyright information explicitly or subtly, the problem remains unexplored for the emerging NeRF format ...
We further experiment on the Brandenburg Gate scene from NeRF-W dataset [34] , with over 800 views of in-the-wild collected online. Training. ...
arXiv:2212.01602v1
fatcat:pfg4qlmd4jd3lelpyybicxuq3i
A Comparative Study of Recent Steganography Techniques for Multiple Image Formats
2019
International Journal of Computer Network and Information Security
This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file ...
The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret ...
J-UNIWARD costs function is studied with images by adding AWG noise. JPEG image of the same scene is used from .BOSSbase 1.01 images. Wang, Z., Yin, Z., & Zhang, X. ...
doi:10.5815/ijcnis.2019.01.02
fatcat:d4yzymvaebcx5o7po7l52kzqwy
Secret data sharing using steganography and image processing
2018
International Journal of Engineering & Technology
The proposed method aims to combine the technique of steganography and Image Processing. Cover image helps to carry the secret data in an embedded form which is referred as stego image. ...
Steganography is a technique that helps to hide the secret data inside the digitally covered image. The message to be hidden can be a text,image, speech, video. ...
Conclusion This work adopts the strategy of steganography along with the image processing which embeds the secret data in an image. ...
doi:10.14419/ijet.v7i1.7.9584
fatcat:krarg6ddtjailj6taaukeucxri
Understandable Steganography
2018
International Journal of Engineering & Technology
In spatial representation the development of image Steganographic methodology in the format of JPEG, along with that we will also debate on the modern developments as far as Steganography is concerned.For ...
The embedded data and its existence are hidden with the help of Steganography. ...
Steganography based on multiple bit-planes By concealing data in the multiple bit planes, the LSB procedure for concealing the data can be simply extended. ...
doi:10.14419/ijet.v7i3.8940
fatcat:salmh4an5zc3fmezgwvt3c742i
Natural Steganography in JPEG Compressed Images
2018
IS&T International Symposium on Electronic Imaging Science and Technology
to pixels to make the embedding resemble the same cover image acquired at a larger sensor ISO setting (the so-called cover source switch). ...
In natural steganography, the secret message is hidden by adding to the cover image a noise signal that mimics the heteroscedastic noise introduced naturally during acquisition. ...
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of AFOSR or the U.S. ...
doi:10.2352/issn.2470-1173.2018.07.mwsf-316
fatcat:cw3dzrk5j5h4pm4iwqmlkbbmoi
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography
[article]
2014
arXiv
pre-print
Digitization of image was a revolutionary step for the fields of photography and Image processing as this made the editing of images much effortless and easier. ...
Today users and editing specialists, equipped with easily available image editing software, manipulate digital images with varied goals. ...
Figure (e) shows the histogram of the same image after saving it in JPEG. ...
arXiv:1407.6877v1
fatcat:ap4jxqj7czddhpqttn3gchswfe
Tackling Android Stego Apps in the Wild
[article]
2018
arXiv
pre-print
A principal challenge of the ML task is to create a great many of stego images from different apps with certain embedding rates. ...
For detection of stego images created from steganography apps, images generated from those apps are ideal to use. ...
Cameraw allows us to take a group of ten pairs of images, including the DNG format and the JPEG format at same time, for each fixed scene with various exposure parameters in one click. ...
arXiv:1808.00430v1
fatcat:kt2l625hx5hibbua63d5xvoza4
JPEG steganography with particle swarm optimization accelerated by AVX
2019
Concurrency and Computation
The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography. ...
Optimization methods can improve the properties of images with embedded secret but introduce additional computational complexity to their processing. ...
JPEG-based image steganography Image steganography is the best-known and the most used type of digital steganography. ...
doi:10.1002/cpe.5448
fatcat:e45t4gadafgvbcr7oko56pfpne
Embedding Novel Views in a Single JPEG Image
[article]
2021
arXiv
pre-print
We propose a novel approach for embedding novel views in a single JPEG image while preserving the perceptual fidelity of the modified JPEG image and the restored novel views. ...
Our model first encodes 32 MPI layers (totally 128 channels) into a 3-channel JPEG image that can be decoded for MPIs to render novel views, with an embedding capacity of 1024 bits per pixel. ...
Users without the plugin can see the scene as a JPEG image, while users with the plugin can view this scene from different viewpoints. ...
arXiv:2108.13003v1
fatcat:afx7sy3inbhcldtr5jpkv7vi54
« Previous
Showing results 1 — 15 out of 294 results