IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Detection of hiding in the least significant bit
IEEE Transactions on Signal Processing - Part II
Steganalysis for Markov cover data with applications to images
IEEE Transactions on Information Forensics and Security
Optimized Feature Extraction for Learning-Based Image Steganalysis
IEEE Transactions on Information Forensics and Security
Factor graphs and the sum-product algorithm
IEEE Transactions on Information Theory
Robust image-adaptive data hiding using erasure and error correction
IEEE Transactions on Image Processing
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Review: A review on blind detection for image steganography
Signal Processing
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Proceedings of the 10th ACM workshop on Multimedia and security
Proceedings of the 10th ACM workshop on Multimedia and security
Novelty detection in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Benchmarking for Steganography
Information Hiding
Secure Cover Selection Steganography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Multi-class Blind Steganalysis Based on Image Run-Length Analysis
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
MPSteg-color: data hiding through redundant basis decomposition
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
A New Statistical Restoration Method for Spatial Domain Images
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Double embedding in the quantization index modulation framework
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
SVD-based universal spatial domain image steganalysis
IEEE Transactions on Information Forensics and Security
BSS: Boosted steganography scheme with cover image preprocessing
Expert Systems with Applications: An International Journal
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
JPEG error analysis and its applications to digital image forensics
IEEE Transactions on Information Forensics and Security
CBS: Contourlet-Based Steganalysis Method
Journal of Signal Processing Systems
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Improved steganographic method preserving pixel-value differencing histogram with modulus function
EURASIP Journal on Advances in Signal Processing
Obtaining higher rates for steganographic schemes while maintaining the same detectability
IH'10 Proceedings of the 12th international conference on Information hiding
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Ternary data hiding technique for JPEG steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Adaptive pixel swapping based steganography reducing embedding noise
PReMI'11 Proceedings of the 4th international conference on Pattern recognition and machine intelligence
Adaptive reversible data hiding scheme based on integer transform
Signal Processing
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Stegobot: a covert social network botnet
IH'11 Proceedings of the 13th international conference on Information hiding
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
An extended matrix encoding algorithm for steganography of high embedding efficiency
Computers and Electrical Engineering
JPEG steganalysis using HBCL statistics and FR index
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Secure steganography using randomized cropping
Transactions on Data Hiding and Multimedia Security VII
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Steganographic algorithm based on parametric discrete cosine transform
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
Detection of StegoBot: a covert social network botnet
Proceedings of the First International Conference on Security of Internet of Things
Improving the embedding efficiency of weight matrix-based steganography for grayscale images
Computers and Electrical Engineering
Block-based image steganalysis: Algorithm and performance evaluation
Journal of Visual Communication and Image Representation
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Pixel rearrangement based statistical restoration scheme reducing embedding noise
Multimedia Tools and Applications
A data hiding scheme based upon DCT coefficient modification
Computer Standards & Interfaces
Hi-index | 0.00 |
A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distortion constrained attacks. We present Yet Another Steganographic Scheme (YASS), a method based on embedding data in randomized locations so as to disable the self-calibration process (such as, by cropping a few pixel rows and/or columns to estimate the cover image features) popularly used by blind steganalysis schemes. The errors induced in the embedded data due to the fact that the stego signal must be advertised in a specific format such as JPEG, are dealt with by the use of erasure and error correcting codes. For the presented JPEG steganograhic scheme, it is shown that the detection rates of recent blind steganalysis schemes are close to random guessing, thus confirming the practical applicability of the proposed technique. We also note that the presented steganography framework, of hiding in randomized locations and using a coding framework to deal with errors, is quite simple yet very generalizable.