Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
IH'04 Proceedings of the 6th international conference on Information Hiding
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Generic Adoption of Spatial Steganalysis to Transformed Domain
Information Hiding
Weighted Stego-Image Steganalysis for JPEG Covers
Information Hiding
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Quantitative steganalysis of LSB embedding in JPEG domain
Proceedings of the 12th ACM workshop on Multimedia and security
Quantitative structural steganalysis of Jsteg
IEEE Transactions on Information Forensics and Security
Stegobot: a covert social network botnet
IH'11 Proceedings of the 13th international conference on Information hiding
Steganalysis in the presence of weak cryptography and encoding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Steganographic algorithm based on parametric discrete cosine transform
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Hi-index | 0.00 |
In this paper, we propose a new method for the detection of LSB embedding in JPEG images. We are motivated by a need to further research the idea of the chi-square attack. The new method simply use the first-order statistics of DCT coefficients, but is more powerful to detect the random embedding in JPEG images. For evaluation, we used versions of Jsteg and Jphide with randomized embedding path to generate stego images in our experiments. In results, the proposed method outperforms the method of Zhang and Ping and is applicable to Jphide. The detection power of both proposed methods is compared to the blind classifier by Fridrich that uses 23 DCT features.