The nature of statistical learning theory
The nature of statistical learning theory
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganography Preserving Statistical Properties
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Feature Extraction: Foundations and Applications (Studies in Fuzziness and Soft Computing)
Feature Extraction: Foundations and Applications (Studies in Fuzziness and Soft Computing)
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
The square root law of steganographic capacity
Proceedings of the 10th ACM workshop on Multimedia and security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Benchmarking for Steganography
Information Hiding
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Asymptotically optimal perfect steganographic systems
Problems of Information Transmission
Steganalysis by subtractive pixel adjacency matrix
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Improved embedding based on a set of cover images
Proceedings of the 11th ACM workshop on Multimedia and security
Fisher Information Determines Capacity of ε-Secure Steganography
Information Hiding
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganography in Digital Media: Principles, Algorithms, and Applications
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
IEEE Transactions on Information Theory
Steganography using Gibbs random fields
Proceedings of the 12th ACM workshop on Multimedia and security
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
"Break our steganographic system": the ins and outs of organizing BOSS
IH'11 Proceedings of the 13th international conference on Information hiding
A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO)
IH'11 Proceedings of the 13th international conference on Information hiding
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis of content-adaptive steganography in spatial domain
IH'11 Proceedings of the 13th international conference on Information hiding
A network-flow-based method for embedding rectification
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Batch steganography in the real world
Proceedings of the on Multimedia and security
Benchmarking for steganography by kernel fisher discriminant criterion
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Securing color information of an image by concealing the color palette
Journal of Systems and Software
Textural features for steganalysis
IH'12 Proceedings of the 14th international conference on Information Hiding
JPEG-Compatibility steganalysis using block-histogram of recompression artifacts
IH'12 Proceedings of the 14th international conference on Information Hiding
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
Digital image steganography using universal distortion
Proceedings of the first ACM workshop on Information hiding and multimedia security
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
Embedding change rate estimation based on ensemble learning
Proceedings of the first ACM workshop on Information hiding and multimedia security
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Steganalysis of F5-like steganography based on selection of joint distribution features
Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service
A study of optimal matrix for efficient matrix embedding in F3
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A novel mapping scheme for steganalysis
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Countering universal image tampering detection with histogram restoration
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Two notes from experimental study on image steganalysis
ICIC'13 Proceedings of the 9th international conference on Intelligent Computing Theories
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Hi-index | 0.00 |
This paper presents a complete methodology for designing practical and highly-undetectable stegosystems for real digital media. The main design principle is to minimize a suitably-defined distortion by means of efficient coding algorithm. The distortion is defined as a weighted difference of extended state-of-the-art feature vectors already used in steganalysis. This allows us to "preserve" the model used by steganalyst and thus be undetectable even for large payloads. This framework can be efficiently implemented even when the dimensionality of the feature set used by the embedder is larger than 107. The high dimensional model is necessary to avoid known security weaknesses. Although high-dimensional models might be problem in steganalysis, we explain, why they are acceptable in steganography. As an example, we introduce HUGO, a new embedding algorithm for spatial-domain digital images and we contrast its performance with LSB matching. On the BOWS2 image database and in contrast with LSB matching, HUGO allows the embedder to hide 7× longer message with the same level of security level.