A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Ensemble Methods in Machine Learning
MCS '00 Proceedings of the First International Workshop on Multiple Classifier Systems
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Boosting SVM classifiers by ensemble
WWW '05 Special interest tracks and posters of the 14th international conference on World Wide Web
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Cover Selection Steganography Method Based on Similarity of Image Blocks
CITWORKSHOPS '08 Proceedings of the 2008 IEEE 8th International Conference on Computer and Information Technology Workshops
A Steganalysis Method Based on Contourlet Transform Coefficients
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
A framework for evaluating the data-hiding capacity of image sources
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper presents a cover selection steganography method based on introduction of a technique for computing steganography capacity as a property of images. An ensemble system that uses different steganalyzer units, determines the upper bound of embedding rate in a cover image. In this technique, each steganalyzer unit is a combination of multiple steganalyzers with a same type but each one trained to detect stego images with a certain payload. Our proposed method minimizes the risk of detection by selecting a proper cover image that its steganography capacity is sufficient to hide a specific secret data securely. Experimental results demonstrate the efficiency and practicability of the proposed technique in enhancing the security of stego images.