Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Steganography Preserving Statistical Properties
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
LSB steganalysis based on high-order statistics
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
A Data Mapping Method for Steganography and Its Application to Images
Information Hiding
How Reed-Solomon codes can improve steganographic schemes
EURASIP Journal on Information Security - Special issue on secure steganography in multimedia content
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector
Digital Signal Processing
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Pre-processing for adding noise steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
Hi-index | 0.00 |
We introduce a steganalytic method which takes advantage of statistics that were preserved to prevent the chi-square attack. We show that preserving statistics by skipping certain groups of pixels—apart from reducing the maximum payload—does not diminish the ability to recognise steganographic modifications. The effect is quite reverse: The new detection method works more reliably than the chi-square attack, if the same message was embedded by overwriting least significant bits and straddled over the whole image.