Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Batch steganography and pooled steganalysis
IH'06 Proceedings of the 8th international conference on Information hiding
On steganographic embedding efficiency
IH'06 Proceedings of the 8th international conference on Information hiding
Constructing good covering codes for applications in steganography
Transactions on data hiding and multimedia security III
IH'05 Proceedings of the 7th international conference on Information Hiding
Generalization of the ZZW embedding construction for steganography
IEEE Transactions on Information Forensics and Security
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
The square root law does not require a linear key
Proceedings of the 12th ACM workshop on Multimedia and security
Generalization and analysis of the paper folding method for steganography
IEEE Transactions on Information Forensics and Security
Ensuring message embedding in wet paper steganography
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Interpolation of steganographic schemes
Signal Processing
Hi-index | 0.00 |
We analyze the asymptotic behavior of the embedding construction for steganography proposed by Zhang, Zhang, and Wang (ZZW) at the 10th information hiding by deriving a closed-form expression for the limit between embedding efficiency of the ZZW construction and the theoretical upper bound as a function of relative payload. This result confirms the experimental observation made in the original publication.