Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Reducing the complexity of syndrome coding for embedding
IH'07 Proceedings of the 9th international conference on Information hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
Steganography using Gibbs random fields
Proceedings of the 12th ACM workshop on Multimedia and security
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Ensuring message embedding in wet paper steganography
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Digital image steganography using universal distortion
Proceedings of the first ACM workshop on Information hiding and multimedia security
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
A robust data hiding algorithm for H.264/AVC video streams
Journal of Systems and Software
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
This paper presents an efficient JPEG steganography method based on heuristic optimization and BCH syndrome coding. The proposed heuristic optimization technique significantly decreases total distortion by inserting and removing AC coefficients 1 or -1 in the most appropriate positions. The implemented data hiding technique is based on structured BCH syndrome coding. This method achieves multiple solutions for hiding data to a block of coefficients. The proposed data hiding method chooses the best solution with minimum distortion effect. As a result, the total distortion can be significantly reduced, which results in less detectability of the steganalysis. The experiments include the steganalysis of the proposed data hiding methods. The experiment results shows that the proposed heuristic optimization significantly decreases detectability of the steganalysis. The proposed methods also outperform the existing steganography methods.