Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
The square root law of steganographic capacity
Proceedings of the 10th ACM workshop on Multimedia and security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
How Reed-Solomon codes can improve steganographic schemes
EURASIP Journal on Information Security - Special issue on secure steganography in multimedia content
Proceedings of the 11th ACM workshop on Multimedia and security
Optimal spread spectrum watermark embedding via a multistep feasibility formulation
IEEE Transactions on Image Processing
Constructing specific matrix for efficient matrix embedding
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Improving embedding efficiency by incorporating SDCS and WPC
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
On steganographic embedding efficiency
IH'06 Proceedings of the 8th international conference on Information hiding
MPSteg-color: a new steganographic technique for color images
IH'07 Proceedings of the 9th international conference on Information hiding
How can reed-Solomon codes improve steganographic schemes?
IH'07 Proceedings of the 9th international conference on Information hiding
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector
Digital Signal Processing
IEEE Transactions on Information Forensics and Security
Generalization and analysis of the paper folding method for steganography
IEEE Transactions on Information Forensics and Security
A steganographic scheme by fully exploiting modification directions
Expert Systems with Applications: An International Journal
Minority codes with improved embedding efficiency for large payloads
Multimedia Tools and Applications
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
A network-flow-based method for embedding rectification
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Ensuring message embedding in wet paper steganography
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Batch steganography in the real world
Proceedings of the on Multimedia and security
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes
Fundamenta Informaticae
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique
Information Sciences: an International Journal
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Self-synchronising image steganography algorithms based on error-correcting codes
International Journal of Electronic Security and Digital Forensics
Interpolation of steganographic schemes
Signal Processing
Hi-index | 0.00 |
Wet paper codes were previously proposed as a tool for construction of steganographic schemes with arbitrary (nonshared) selection channels. In this paper, we propose a new approach to wet paper codes using random linear codes of small codimension that at the same time improves the embedding efficiency (number of random message bits embedded per embedding change). Practical algorithms are given and their performance is evaluated experimentally and compared to theoretically achievable bounds. An approximate formula for the embedding efficiency of the proposed scheme is derived. The proposed coding method can be modularly combined with most steganographic schemes to improve their security.