Fundamentals of digital image processing
Fundamentals of digital image processing
Cryptography: an introduction to computer security
Cryptography: an introduction to computer security
Digital watermarking
A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
BPCS steganography using EZW lossy compressed images
Pattern Recognition Letters
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
An iterative method of palette-based image steganography
Pattern Recognition Letters
High-performance JPEG steganography using quantization index modulation in DCT domain
Pattern Recognition Letters
A novel image-hiding scheme based on block difference
Pattern Recognition
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A robust watermarking scheme using self-reference image
Computer Standards & Interfaces
Hiding secret data in images via predictive coding
Pattern Recognition
Spectrum Steganalysis of WAV Audio Streams
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Dot-Size Variant Visual Cryptography
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
A reversible data hiding scheme using complementary embedding strategy
Information Sciences: an International Journal
A progressive quality hiding strategy based on equivalence partitions of hiding units
Transactions on data hiding and multimedia security VI
A technique of embedding digital data in an image compression code reversibly
Proceedings of the 4th International Conference on Uniquitous Information Management and Communication
Hi-index | 0.01 |
A high-performance JPEG steganography should be secure enough to resist modern steganalysis. In this paper, we propose a high-performance JPEG steganographic method. The proposed method adopts the complementary embedding strategy to avoid the detections of several statistical attacks. To show the effectiveness of the proposed method, several statistical attacks are simulated and used to detect the stego-images created by the proposed method. Several famous JPEG steganographic algorithms are also simulated for comparisons with the proposed method. Experimental results show that the proposed steganographic method has superior performance both in capacity and security, and is practical for the application of secret communication.