Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Detecting LSB Steganography in Color and Gray-Scale Images
IEEE MultiMedia
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
IH'04 Proceedings of the 6th international conference on Information Hiding
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Secret and public key image watermarking schemes for image authentication and ownership verification
IEEE Transactions on Image Processing
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures
Hi-index | 0.00 |
We propose two efficient information hiding algorithms in the least significant bits of JPEG coefficients of images. Our algorithms embed information by modifying JPEG coefficients in such a way that the introduced distortion is minimized. We derive the expected value of the additional error due to distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. We have implemented our methods in Java and performed the extensive experiments with them. The experiments have shown that our theoretical predictions agree closely with the actual introduced distortions.