Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Proceedings of the 11th ACM workshop on Multimedia and security
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
"Break our steganographic system": the ins and outs of organizing BOSS
IH'11 Proceedings of the 13th international conference on Information hiding
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
"Break our steganographic system": the ins and outs of organizing BOSS
IH'11 Proceedings of the 13th international conference on Information hiding
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis with mismatched covers: do simple classifiers help?
Proceedings of the on Multimedia and security
Information Sciences: an International Journal
Steganalysis of LSB replacement using parity-aware features
IH'12 Proceedings of the 14th international conference on Information Hiding
Textural features for steganalysis
IH'12 Proceedings of the 14th international conference on Information Hiding
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
A novel mapping scheme for steganalysis
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Two notes from experimental study on image steganalysis
ICIC'13 Proceedings of the 9th international conference on Intelligent Computing Theories
Hi-index | 0.00 |
Content-adaptive steganography constrains its embedding changes to those parts of covers that are difficult to model, such as textured or noisy regions. When combined with advanced coding techniques, adaptive steganographic methods can embed rather large payloads with low statistical detectability at least when measured using feature-based steganalyzers trained on a given cover source. The recently proposed steganographic algorithm HUGO is an example of this approach. The goal of this paper is to subject this newly proposed algorithm to analysis, identify features capable of detecting payload embedded using such schemes and obtain a better picture regarding the benefit of adaptive steganography with public selection channels. This work describes the technical details of our attack on HUGO as part of the BOSS challenge.