Image Analysis, Random Fields and Markov Chain Monte Carlo Methods: A Mathematical Introduction (Stochastic Modelling and Applied Probability)
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
International Journal of Computer Vision
Steganalysis by subtractive pixel adjacency matrix
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganography in Digital Media: Principles, Algorithms, and Applications
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Batch steganography and pooled steganalysis
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
MPSteg-color: a new steganographic technique for color images
IH'07 Proceedings of the 9th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Exploiting preserved statistics for steganalysis
IH'04 Proceedings of the 6th international conference on Information Hiding
The Information Lost in Erasures
IEEE Transactions on Information Theory
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
IEEE Transactions on Information Forensics and Security - Part 2
Steganography using Gibbs random fields
Proceedings of the 12th ACM workshop on Multimedia and security
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
"Break our steganographic system": the ins and outs of organizing BOSS
IH'11 Proceedings of the 13th international conference on Information hiding
A network-flow-based method for embedding rectification
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Batch steganography in the real world
Proceedings of the on Multimedia and security
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Digital image steganography using universal distortion
Proceedings of the first ACM workshop on Information hiding and multimedia security
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Message in a bottle: sailing past censorship
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.00 |
We make a connection between steganography design by minimizing embedding distortion and statistical physics. The unique aspect of this work and one that distinguishes it from prior art is that we allow the distortion function to be arbitrary, which permits us to consider spatially dependent embedding changes. We provide a complete theoretical framework and describe practical tools, such as the thermodynamic integration for computing the rate-distortion bound and the Gibbs sampler for simulating the impact of optimal embedding schemes and constructing practical algorithms. The proposed framework reduces the design of secure steganography in empirical covers to the problem of finding local potentials for the distortion function that correlate with statistical detectability in practice. Byworking out the proposed methodology in detail for a specific choice of the distortion function, we experimentally validate the approach and discuss various options available to the steganographer in practice.