IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
The square root law of steganographic capacity
Proceedings of the 10th ACM workshop on Multimedia and security
Proceedings of the 10th ACM workshop on Multimedia and security
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
IH'04 Proceedings of the 6th international conference on Information Hiding
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Quantitative steganalysis of LSB embedding in JPEG domain
Proceedings of the 12th ACM workshop on Multimedia and security
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
Quantitative structural steganalysis of Jsteg
IEEE Transactions on Information Forensics and Security
Steganalysis using partially ordered Markov models
IH'10 Proceedings of the 12th international conference on Information hiding
Obtaining higher rates for steganographic schemes while maintaining the same detectability
IH'10 Proceedings of the 12th international conference on Information hiding
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis of content-adaptive steganography in spatial domain
IH'11 Proceedings of the 13th international conference on Information hiding
Countering counter-forensics: the case of JPEG compression
IH'11 Proceedings of the 13th international conference on Information hiding
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Steganalysis for calibrated and lower embedded uncalibrated images
SEMCCO'11 Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part II
Block dependency feature based classification scheme for uncalibrated image steganalysis
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Shift recompression-based feature mining for detecting content-aware scaled forgery in JPEG images
Proceedings of the Twelfth International Workshop on Multimedia Data Mining
A new watermarking method with obfuscated quasi-chirp transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Benchmarking for steganography by kernel fisher discriminant criterion
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Steganalysis of LSB replacement using parity-aware features
IH'12 Proceedings of the 14th international conference on Information Hiding
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
Embedding change rate estimation based on ensemble learning
Proceedings of the first ACM workshop on Information hiding and multimedia security
Block-based image steganalysis: Algorithm and performance evaluation
Journal of Visual Communication and Image Representation
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A data hiding scheme based upon DCT coefficient modification
Computer Standards & Interfaces
Hi-index | 0.00 |
Calibration was first introduced in 2002 as a new concept to attack the F5 algorithm [3]. Since then, it became an essential part of many feature-based blind and targeted steganalyzers in JPEG as well as spatial domain. The purpose of this paper is to shed more light on how, why, and when calibration works. In particular, this paper challenges the thesis that the purpose of calibration is to estimate cover image features from the stego image. We classify calibration according to its internal mechanism into several canonical examples, including the case when calibration hurts the detection performance. All examples are demonstrated on specific steganographic schemes and steganalysis features. Furthermore, we propose a modified calibration procedure that improves practical steganalysis.