An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Defeating the Current Steganalysis Techniques (Robust Steganography)
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
IJCAI'07 Proceedings of the 20th international joint conference on Artifical intelligence
Novel stream mining for audio steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Derivative-based audio steganalysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
IH'04 Proceedings of the 6th international conference on Information Hiding
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
IEEE Transactions on Circuits and Systems for Video Technology
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Hi-index | 0.00 |
The objective of steganography is to implement covert communication by hiding data in digital files such that there is no indication of the existence of hidden data; so an ideal steganographic system should be able to withstand all steganalysis methods--or be undetectable. In image steganography, several information-hiding systems have been proposed for JPEG images. However, with the advances in steganalysis, it seems that fewer and fewer steganography systems are truly undetectable. In this paper, we design a new steganography called statistically invisible steganography (SIS) to hide data in JPEG images, which are invulnerable to current methods of steganalysis. Specifically, we embed data in the selective coefficients of the selective DCT blocks that have high complexity and maintain original statistics. Experimental results show that current techniques of steganalysis are unable to successfully detect SIS steganograms.