An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
Hi-index | 0.00 |
Within this paper, we investigate steganographic techniques based on analyzing a set of realizations of one and the same cover image. Starting point for our investigations is the algorithm ECAP [3] that particularly aims at considering dependencies between pixels while generating the stego image. Within this paper, we point out potential problems of ECAP that may result from irregular differences between the single representations of the cover. Based on these considerations, we discuss possibilities to overcome the mentioned problems and introduce improved embedding techniques. Steganalytical results show the achieved security in comparison to the well known ± steganography.