The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In this paper, we proposed a new method for Steganography based on deceiving Χ 2 algorithm. Since the cover image coefficients and stego image coefficients histograms have sensible difference for purposes of statistical properties, statistical analysis of Χ 2-test reveals the existence of hidden messages inside stego image .We are introducing the idea for hiding messages in the cover image. It causes that DCT (Discrete Cosine Transforms) coefficient histogram not having remarkable modification before and after embedding message. As a result, the identifying of hidden message inside an image is impossible for an eavesdropper through Χ 2-test. In fact, the proposed method increases the Steganography security against Χ 2-test, but the capacity of embedding messages decreases to half.