Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Quantization-based watermarking performance improvement using host statistics: AWGN attack case
Proceedings of the 2004 workshop on Multimedia and security
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganography in Digital Media: Principles, Algorithms, and Applications
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Writing on dirty paper (Corresp.)
IEEE Transactions on Information Theory
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
A mathematical analysis of the DCT coefficient distributions for images
IEEE Transactions on Image Processing
Image security and biometrics: a review
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Hi-index | 0.00 |
The quantization based embedding systems are widely used in the information hiding applications, thanks to their efficiency and simplicity. Moreover, they are known to be insecure in steganography context according to the Cachins' security definition because they distort the stego-signal probability density function. In this paper, we show that using the well-known spread transform (ST) combining with quantization based embedding systems provides an @e-secure stego-system in the sense of Cachin's security definition. In other words, we show theoretically that this system preserves, in the sense of the relative entropy, the probability density function of the stego-signal as long as the ratio between the quantization step and the square root of the spreading factor is small. This highlights the fundamental tradeoff between these two quantities. Our theoretical conclusions are validated and illustrated on real images. Finally, a comparison with the Solanki et al. blind steganographic scheme is given.