BPCS steganography using EZW lossy compressed images
Pattern Recognition Letters
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
A high quality steganographic method with pixel-value differencing and modulus function
Journal of Systems and Software
Secure Steganography in Compressed Video Bitstreams
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
A Steganographic Algorithm for Hiding Data in PDF Files Based on Equivalent Transformation
ISIP '08 Proceedings of the 2008 International Symposiums on Information Processing
A reversible data hiding scheme using complementary embedding strategy
Information Sciences: an International Journal
Edge adaptive image steganography based on LSB matching revisited
IEEE Transactions on Information Forensics and Security
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
Information Sciences: an International Journal
Reversible data hiding based on block median preservation
Information Sciences: an International Journal
Reversible steganography based on side match and hit pattern for VQ-compressed images
Information Sciences: an International Journal
A steganographic method for digital images robust to RS steganalysis
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Detection of LSB steganography via sample pair analysis
IEEE Transactions on Signal Processing
IEEE Transactions on Information Forensics and Security
A steganographic scheme for secure communications based on the chaos and euler Theorem
IEEE Transactions on Multimedia
Time-spread echo method for digital audio watermarking
IEEE Transactions on Multimedia
A Reversible Data Hiding Scheme Based on Side Match Vector Quantization
IEEE Transactions on Circuits and Systems for Video Technology
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Secret sharing with multi-cover adaptive steganography
Information Sciences: an International Journal
Hi-index | 0.07 |
Statistical steganalysis schemes detect the existence of secret information embedded by steganography. The x^2-detection and Regular-Singular (RS)-attack methods are two well-known statistical steganalysis schemes used against LSB (least significant bit) steganography. The embedded message length can be estimated accurately by these two steganalysis schemes. For secret communication, the resistance of steganography against steganalysis is very important for information security. To avoid the enemy's attempts, the statistical features between stego-images and cover images should be as similar as possible for better resistance to steganalysis. In this manuscript, a reversible histogram transformation function-based LSB steganographic method is proposed to resist statistical steganalysis. The experimental results show that the proposed method resists not only RS-attack but also x^2-detection methods.