Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








294 Hits in 5.2 sec

Steganography With Multiple JPEG Images of the Same Scene

Tomas Denemark, Jessica Fridrich
2017 IEEE Transactions on Information Forensics and Security  
security with relevance steganography utilizing one JPEG image.  ...  During this paper, we have a tendency to investigate another style of side-informationa group of multiple JPEG pictures of identical scenefor applications once the sender doesn't have access to a precover  ...  In this case, Alice can utilize a different type of side-informationshe can take multiple JPEG images of the same scene.  ... 
doi:10.1109/tifs.2017.2705625 fatcat:62rmlt4xcvdovkcto3qxy3f7ly

JPEG Image Steganography based on Coefficients Selection and Partition

Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez
2017 International Journal of Image Graphics and Signal Processing  
In this paper, we propose a novel JPEG image Steganography algorithm based on partition schemes on image coefficient values.  ...  Our method selects the AC and DC coefficients of a JPEG image according to a channel selection method and then identifies appropriate coefficients to store the secret data-bits.  ...  PSNR comparisons of the proposed algorithm with other JPEG Steganography methods.Fig.6. Output stego image results of Lena for different values of ER and ECCI.  ... 
doi:10.5815/ijigsp.2017.06.02 fatcat:s72soavomfgaflypmi4lesc4bu

StegoAppDB: a Steganography Apps Forensics Image Database

Jennifer Newman, Li Lin, Wenhao Chen, Stephanie Reinders, Yangxiao Wang, Min Wu, Yong Guan
2019 IS&T International Symposium on Electronic Imaging Science and Technology  
We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats.  ...  We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats.  ...  Acknowledgement We are grateful to the following undergraduate students for helping us acquire images for our database: Yiqiu Qian; Joseph Bingham; Chase Webb; and Mingming Yue.  ... 
doi:10.2352/issn.2470-1173.2019.5.mwsf-536 fatcat:oan6zhemgvditkhszpc4ppthhu

StegoAppDB: a Steganography Apps Forensics Image Database [article]

Jennifer Newman, Li Lin, Wenhao Chen, Stephanie Reinders, Yangxiao Wang, Min Wu, Yong Guan
2019 arXiv   pre-print
We develop a camera app, Cameraw, specifically for data acquisition, with multiple images per scene, saving simultaneously in both DNG and high-quality JPEG formats.  ...  StegoAppDB, a steganography apps forensics image database, contains over 810,000 innocent and stego images using a minimum of 10 different phone models from 24 distinct devices, with detailed provenanced  ...  Acknowledgement We are grateful to the following undergraduate students for helping us acquire images for our database: Yiqiu Qian; Joseph Bingham; Chase Webb; and Mingming Yue.  ... 
arXiv:1904.09360v1 fatcat:rh36axyrozaixf5254e5uynfmy

Study of Effect of DCT Domain Steganography Techniques in Spatial Domain for JPEG Images Steganalysis

G.R. Suryawanshi, S.N. Mali
2015 International Journal of Computer Applications  
A set of feature is identified for the analysis of covert communication through the image.  ...  Steganography is a technique of hiding secret data into digital images in different domain like frequency, spatial or wavelet.  ...  The spatial domain image is said to have a normal image space, which means that each image element at location ℓ in image I is a projection at the same location in scene S.  ... 
doi:10.5120/ijca2015906396 fatcat:saazhpmhbjea3d3idckkbmncna

Model Based Steganography with Precover

Tomáš Denemark, Jessica Fridrich
2017 IS&T International Symposium on Electronic Imaging Science and Technology  
Experiments with uncompressed and JPEG images show promise of this theoretically well-founded approach.  ...  It is widely recognized that steganography with sideinformation in the form of a precover at the sender enjoys significantly higher empirical security than other embedding schemes.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of AFOSR or the U.S.  ... 
doi:10.2352/issn.2470-1173.2017.7.mwsf-326 fatcat:6ddcyk2yrvh6notewtu3gjnybi

StegaNeRF: Embedding Invisible Information within Neural Radiance Fields [article]

Chenxin Li, Brandon Y. Feng, Zhiwen Fan, Panwang Pan, Zhangyang Wang
2022 arXiv   pre-print
StegaNeRF signifies an initial exploration into the novel problem of instilling customizable, imperceptible, and recoverable information to NeRF renderings, with minimal impact to rendered images.  ...  However, while common visual data (images and videos) have standard approaches to embed ownership or copyright information explicitly or subtly, the problem remains unexplored for the emerging NeRF format  ...  We further experiment on the Brandenburg Gate scene from NeRF-W dataset [34] , with over 800 views of in-the-wild collected online. Training.  ... 
arXiv:2212.01602v1 fatcat:pfg4qlmd4jd3lelpyybicxuq3i

A Comparative Study of Recent Steganography Techniques for Multiple Image Formats

Arshiya Sajid Ansari, Mohammad Sajid Mohammadi, Mohammad Tanvir Parvez
2019 International Journal of Computer Network and Information Security  
This paper presents the comparative study and performance analysis of different image Steganography methods using various types of cover media ((like BMP/JPEG/PNG etc.) with the discussion of their file  ...  The aim of Steganography is to transfer secrete message to another party by hiding the data in a cover object, so that the imposter who monitors the traffic should not distinguish between genuine secret  ...  J-UNIWARD costs function is studied with images by adding AWG noise. JPEG image of the same scene is used from .BOSSbase 1.01 images. Wang, Z., Yin, Z., & Zhang, X.  ... 
doi:10.5815/ijcnis.2019.01.02 fatcat:d4yzymvaebcx5o7po7l52kzqwy

Secret data sharing using steganography and image processing

R Bhuvanya, K Vijayalakshmi, S Uma, A A.Suresh
2018 International Journal of Engineering & Technology  
The proposed method aims to combine the technique of steganography and Image Processing. Cover image helps to carry the secret data in an embedded form which is referred as stego image.  ...  Steganography is a technique that helps to hide the secret data inside the digitally covered image. The message to be hidden can be a text,image, speech, video.  ...  Conclusion This work adopts the strategy of steganography along with the image processing which embeds the secret data in an image.  ... 
doi:10.14419/ijet.v7i1.7.9584 fatcat:krarg6ddtjailj6taaukeucxri

Understandable Steganography

Indu Maurya, S K Gupta
2018 International Journal of Engineering & Technology  
In spatial representation the development of image Steganographic methodology in the format of JPEG, along with that we will also debate on the modern developments as far as Steganography is concerned.For  ...  The embedded data and its existence are hidden with the help of Steganography.  ...  Steganography based on multiple bit-planes By concealing data in the multiple bit planes, the LSB procedure for concealing the data can be simply extended.  ... 
doi:10.14419/ijet.v7i3.8940 fatcat:salmh4an5zc3fmezgwvt3c742i

Natural Steganography in JPEG Compressed Images

Tomáš Denemark, Patrick Bas, Jessica Fridrich
2018 IS&T International Symposium on Electronic Imaging Science and Technology  
to pixels to make the embedding resemble the same cover image acquired at a larger sensor ISO setting (the so-called cover source switch).  ...  In natural steganography, the secret message is hidden by adding to the cover image a noise signal that mimics the heteroscedastic noise introduced naturally during acquisition.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied of AFOSR or the U.S.  ... 
doi:10.2352/issn.2470-1173.2018.07.mwsf-316 fatcat:cw3dzrk5j5h4pm4iwqmlkbbmoi

An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography [article]

Minati Mishra, M. C. Adhikary
2014 arXiv   pre-print
Digitization of image was a revolutionary step for the fields of photography and Image processing as this made the editing of images much effortless and easier.  ...  Today users and editing specialists, equipped with easily available image editing software, manipulate digital images with varied goals.  ...  Figure (e) shows the histogram of the same image after saving it in JPEG.  ... 
arXiv:1407.6877v1 fatcat:ap4jxqj7czddhpqttn3gchswfe

Tackling Android Stego Apps in the Wild [article]

Wenhao Chen, Li Lin, Min Wu, Jennifer Newman
2018 arXiv   pre-print
A principal challenge of the ML task is to create a great many of stego images from different apps with certain embedding rates.  ...  For detection of stego images created from steganography apps, images generated from those apps are ideal to use.  ...  Cameraw allows us to take a group of ten pairs of images, including the DNG format and the JPEG format at same time, for each fixed scene with various exposure parameters in one click.  ... 
arXiv:1808.00430v1 fatcat:kt2l625hx5hibbua63d5xvoza4

JPEG steganography with particle swarm optimization accelerated by AVX

Vaclav Snasel, Pavel Kromer, Jakub Safarik, Jan Platos
2019 Concurrency and Computation  
The JPEG format is prevalent in digital communication, and images are often used as cover objects in digital steganography.  ...  Optimization methods can improve the properties of images with embedded secret but introduce additional computational complexity to their processing.  ...  JPEG-based image steganography Image steganography is the best-known and the most used type of digital steganography.  ... 
doi:10.1002/cpe.5448 fatcat:e45t4gadafgvbcr7oko56pfpne

Embedding Novel Views in a Single JPEG Image [article]

Yue Wu and Guotao Meng and Qifeng Chen
2021 arXiv   pre-print
We propose a novel approach for embedding novel views in a single JPEG image while preserving the perceptual fidelity of the modified JPEG image and the restored novel views.  ...  Our model first encodes 32 MPI layers (totally 128 channels) into a 3-channel JPEG image that can be decoded for MPIs to render novel views, with an embedding capacity of 1024 bits per pixel.  ...  Users without the plugin can see the scene as a JPEG image, while users with the plugin can view this scene from different viewpoints.  ... 
arXiv:2108.13003v1 fatcat:afx7sy3inbhcldtr5jpkv7vi54
« Previous Showing results 1 — 15 out of 294 results