A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
Category attack for LSB steganalysis of JPEG images
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
Steganography is often combined with cryptographic mechanisms. This enhances steganography by valuable properties that are originally left to cryptographic systems. However, new problems for cryptographic mechanisms arise from the context of steganography. There are two sorts of steganographic tools: commercial tools with insecure or badly implemented cryptography and academic proof-of-concepts that abstain from the actual implementation of the cryptographic part. Comparably to cryptography, steganography evolves in an iterative process of designing and breaking new methods. In this paper we examine the encoding properties and cryptographic functionality of steganographic tools to enable the detection of embedded information in steganograms even if the embedding part was otherwise secure.