Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Statistical characterisation of MP3 encoders for steganalysis
Proceedings of the 2004 workshop on Multimedia and security
LSB steganalysis based on high-order statistics
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A DCT-based Mod4 steganographic method
Signal Processing
Least significant bit steganography detection with machine learning techniques
Proceedings of the 2007 international workshop on Domain driven data mining
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Review: A review on blind detection for image steganography
Signal Processing
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Proceedings of the 10th ACM workshop on Multimedia and security
Novelty detection in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Detection of word shift steganography in PDF document
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Generic Adoption of Spatial Steganalysis to Transformed Domain
Information Hiding
Weighted Stego-Image Steganalysis for JPEG Covers
Information Hiding
Benchmarking for Steganography
Information Hiding
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis Versus Splicing Detection
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis of JPEG Images with Joint Transform Features
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Secure Cover Selection Steganography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Proceedings of the 11th ACM workshop on Multimedia and security
Steganalysis by subtractive pixel adjacency matrix
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique
SCIA '09 Proceedings of the 16th Scandinavian Conference on Image Analysis
Spectrum Steganalysis of WAV Audio Streams
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Multi-class Blind Steganalysis Based on Image Run-Length Analysis
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Novel stream mining for audio steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
Temporal derivative-based spectrum and mel-cepstrum audio steganalysis
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
A wavelet-based blind JPEG image steganalysis uing co-occurrence matrix
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Performance comparison of DCT and Walsh transform for steganography
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Advantages of using feature selection techniques on steganalysis schemes
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
Information Sciences: an International Journal
Steganalysis for JPEG images based on statistical features of stego and cover images
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Steganalysis for Markov feature of difference array in DCT domain
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 7
Constructing good covering codes for applications in steganography
Transactions on data hiding and multimedia security III
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
Classification of steganalysis techniques: A study
Digital Signal Processing
Expert Systems with Applications: An International Journal
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
CBS: Contourlet-Based Steganalysis Method
Journal of Signal Processing Systems
Passive steganalysis based on higher order image statistics of curvelet transform
International Journal of Automation and Computing
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Steganalysis using partially ordered Markov models
IH'10 Proceedings of the 12th international conference on Information hiding
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Ternary data hiding technique for JPEG steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Blind quantitative steganalysis based on feature fusion and gradient boosting
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Derivative-based audio steganalysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Multimedia Tools and Applications
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Breaking HUGO: the process discovery
IH'11 Proceedings of the 13th international conference on Information hiding
Countering counter-forensics: the case of JPEG compression
IH'11 Proceedings of the 13th international conference on Information hiding
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Towards multi-class blind steganalyzer for JPEG images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Pre-processing for adding noise steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis
Multimedia Tools and Applications
Binary image steganographic techniques classification based on multi-class steganalysis
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Multiple messages embedding using DCT-Based mod4 steganographic method
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Improving steganalysis by fusion techniques: a case study with image steganography
Transactions on Data Hiding and Multimedia Security I
Category attack for LSB steganalysis of JPEG images
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Universal JPEG steganalysis in the compressed frequency domain
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Steganalysis based on differential statistics
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Steganalysis for calibrated and lower embedded uncalibrated images
SEMCCO'11 Proceedings of the Second international conference on Swarm, Evolutionary, and Memetic Computing - Volume Part II
Block dependency feature based classification scheme for uncalibrated image steganalysis
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Anti-Forensics of double JPEG compression detection
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A Novel bayesian classifier with smaller eigenvalues reset by threshold based on given database
ICIAR'07 Proceedings of the 4th international conference on Image Analysis and Recognition
Steganographic algorithm based on parametric discrete cosine transform
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Textural features for steganalysis
IH'12 Proceedings of the 14th international conference on Information Hiding
Block-based image steganalysis: Algorithm and performance evaluation
Journal of Visual Communication and Image Representation
A novel mapping scheme for steganalysis
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embedding mechanisms. The detection method is a linear classifier trained on feature vectors corresponding to cover and stego images. In contrast to previous blind approaches, the features are calculated as an L1 norm of the difference between a specific macroscopic functional calculated from the stego image and the same functional obtained from a decompressed, cropped, and recompressed stego image. The functionals are built from marginal and joint statistics of DCT coefficients. Because the features are calculated directly from DCT coefficients, conclusions can be drawn about the impact of embedding modifications on detectability. Three different steganographic paradigms are tested and compared. Experimental results reveal new facts about current steganographic methods for JPEGs and new de-sign principles for more secure JPEG steganography.