Proceedings of the First International Workshop on Information Hiding
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Robust watermarking based on DWT and nonnegative matrix factorization
Computers and Electrical Engineering
Adaptive color image watermarking based on a modified improved pixel-wise masking technique
Computers and Electrical Engineering
Feature based robust watermarking using image normalization
Computers and Electrical Engineering
Invariant image watermarking using multi-scale Harris detector and wavelet moments
Computers and Electrical Engineering
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
The JPEG still picture compression standard
IEEE Transactions on Consumer Electronics
A robust hybrid method for image encryption based on Hopfield neural network
Computers and Electrical Engineering
Improving the embedding efficiency of weight matrix-based steganography for grayscale images
Computers and Electrical Engineering
Hi-index | 0.00 |
F5 steganography is much different from most of LSB replacement or matching steganographic schemes, because matrix encoding is employed to increase embedding efficiency while reducing the number of necessary changes. By using this scheme, the hidden message inserted into carrier media imperceptibly can be transferred via a more secure subliminal channel. The embedding domain is the quantized DCT coefficients of JPEG image, which makes the scheme be immune to visual attack and statistical attack from the steganalyst. Based on this effective scheme, an extended matrix encoding algorithm is proposed to improve the performance further in this paper. By changing the hash function in matrix encoding and converting the coding mode, the embedding efficiency and embedding rate get increased to a large extent. Eventually, the experimental results demonstrate the extended algorithm is superior to the classic F5 steganography.