Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Detection of LSB Steganography via Sample Pair Analysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
What's Your Sign?: Efficient Sign Coding for Embedded Wavelet Image Coding
DCC '00 Proceedings of the Conference on Data Compression
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
On Estimation of Secret Message Length in JSteg-like Steganography
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
Category attack for LSB steganalysis of JPEG images
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Detection of LSB steganography via sample pair analysis
IEEE Transactions on Signal Processing
Context-based entropy coding of block transform coefficients for image compression
IEEE Transactions on Image Processing
Embedding change rate estimation based on ensemble learning
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
There are several powerful steganalytic methods for images in the spatial domain, which are based on higher order statistics. We propose a generic methodology to prepare higher order steganalytic methods from spatial domain for application in the transformed domain. This paper presents 72 new systematically designed methods that are derived from the spatial domain. Their reliability and the precision of their length estimation is evaluated based on 1700 million attacks. We present the contribution of the proposed methods in terms of detection power and precision compared to prior art and determine how properties like image size and JPEG quality influence the ranking of the proposed attacks.