Linguistic steganography using automatically generated paraphrases
HLT '10 Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics
Quantitative structural steganalysis of Jsteg
IEEE Transactions on Information Forensics and Security
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Steganalysis using partially ordered Markov models
IH'10 Proceedings of the 12th international conference on Information hiding
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
ICSI'11 Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part I
How quantization based schemes can be used in image steganographic context
Image Communication
A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO)
IH'11 Proceedings of the 13th international conference on Information hiding
A cover image model for reliable steganalysis
IH'11 Proceedings of the 13th international conference on Information hiding
Securing color information of an image by concealing the color palette
Journal of Systems and Software
High payload data-hiding in audio signals based on a modified OFDM approach
Expert Systems with Applications: An International Journal
Steganalysis of LSB replacement using parity-aware features
IH'12 Proceedings of the 14th international conference on Information Hiding
Statistical detection of LSB matching using hypothesis testing theory
IH'12 Proceedings of the 14th international conference on Information Hiding
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
Cryptagram: photo privacy for online social media
Proceedings of the first ACM conference on Online social networks
A study of optimal matrix for efficient matrix embedding in F3
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Blacknoise: lightweight low-fi steganography in defense of free speech
Proceedings of the 4th Annual Symposium on Computing for Development
VoIP steganography and its Detection—A survey
ACM Computing Surveys (CSUR)
A new approach to high-capacity annotation watermarking based on digital fountain codes
Multimedia Tools and Applications
Image encryption based on the finite field cosine transform
Image Communication
Communications of the ACM
Hi-index | 0.02 |
Steganography, the art of hiding of information in apparently innocuous objects or images, is a field with a rich heritage, and an area of rapid current development. This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of steganography. Assuming only a basic knowledge in calculus and statistics, the book blends the various strands of steganography, including information theory, coding, signal estimation and detection, and statistical signal processing. Experiments on real media files demonstrate the performance of the techniques in real life, and most techniques are supplied with pseudo-code, making it easy to implement the algorithms. The book is ideal for students taking courses on steganography and information hiding, and is also a useful reference for engineers and practitioners working in media security and information assurance.