Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
On Estimation of Secret Message Length in JSteg-like Steganography
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Proceedings of the 11th ACM workshop on Multimedia and security
A fusion of maximum likelihood and structural steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Quantitative structural steganalysis of Jsteg
IEEE Transactions on Information Forensics and Security
An improved sample pairs method for detection of LSB embedding
IH'04 Proceedings of the 6th international conference on Information Hiding
A general framework for structural steganalysis of LSB replacement
IH'05 Proceedings of the 7th international conference on Information Hiding
Category attack for LSB steganalysis of JPEG images
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Detection of hiding in the least significant bit
IEEE Transactions on Signal Processing - Part II
Derivation of Error Distribution in Least Squares Steganalysis
IEEE Transactions on Information Forensics and Security
A new watermarking method with obfuscated quasi-chirp transform
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Hi-index | 0.00 |
We construct new quantitative steganalyzers for steganographic techniques that hide data using LSB embedding in quantized DCT coefficients of a JPEG file. Two approaches are explored -- change-rate estimation using the maximum likelihood principle with a precover model and a heuristic approach based on minimizing a penalty functional obtained from a combined analysis of the embedding operation and properties of natural images. The techniques are applied to Jsteg and its modified version called symmetric Jsteg. Experiments are used to compare the new methods with current state of the art.