Software watermarking: models and dynamic embeddings
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Secure high data embedding rate for steganographic application
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
A new paradigm hidden in steganography
Proceedings of the 2000 workshop on New security paradigms
A steganographic method based upon JPEG and quantization table modification
Information Sciences—Informatics and Computer Science: An International Journal - Special issue: Intelligent multimedia computing and networking
IEEE Transactions on Computers
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
Video error correction using steganography
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
SVD-Based Approach to Transparent Embedding Data into Digital Images
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Reed Solomon Codes for Digital Fingerprinting
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
An Implementation of Key-Based Digital Signal Steganography
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A Graph Theoretic Approach to Software Watermarking
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Audio Watermark Robustness to Desynchronization via Beat Detection
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Natural Language Watermarking and Tamperproofing
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection
ISW '00 Proceedings of the Third International Workshop on Information Security
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
A Novel Scheme for Securing Image Steganography
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A steganographic method for images by pixel-value differencing
Pattern Recognition Letters
A Secure Data Hiding Scheme for Two-Color Images
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
IBM Systems Journal
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Spatial domain image hiding scheme using pixel-values differencing
Fundamenta Informaticae
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A review of information security issues and respective research contributions
ACM SIGMIS Database
Steganography obliterator: an attack on the least significant bits
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata
Journal of Systems and Software
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Reading between the lines: lessons from the SDMI challenge
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Reading between the lines: lessons from the SDMI challenge
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Deducing similarities in Java sources from bytecodes
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Video error correction using steganography
EURASIP Journal on Applied Signal Processing
Dynamic graph-based software fingerprinting
ACM Transactions on Programming Languages and Systems (TOPLAS)
Unicode Steganographic Exploits: Maintaining Enterprise Border Security
IEEE Security and Privacy
Steganographic methods based on digital logic
SIP'07 Proceedings of the 6th Conference on 6th WSEAS International Conference on Signal Processing - Volume 6
Hiding encrypted speech using steganography
MIV'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Multimedia, Internet & Video Technologies - Volume 7
Histogram-based undetectable fidelity image in steganography as MSB controller
Proceedings of the 2nd international conference on Ubiquitous information management and communication
A novel covert channel based on the IP header record route option
International Journal of Advanced Media and Communication
Exploiting error control in network traffic for robust, high rate covert channels
International Journal of Electronic Security and Digital Forensics
Message hidden in 1st and 2nd bit plane
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
An improved method for steganography on mobile phone
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
The capability of image in hiding a secret message
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
Data hiding method using image interpolation
Computer Standards & Interfaces
Blind tamper detection in audio using chirp based robust watermarking
WSEAS Transactions on Signal Processing
A Data Mapping Method for Steganography and Its Application to Images
Information Hiding
A Supraliminal Channel in a Videoconferencing Application
Information Hiding
The Hiding of Secret Data Using the Run Length Matching Method
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A High Payload VQ Steganographic Method for Binary Images
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
International Journal of Communication Networks and Distributed Systems
A framework for synthetic stego
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
The decoy: multi-level digital multimedia steganography model
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
A high-capacity steganography scheme for JPEG2000 baseline system
IEEE Transactions on Image Processing
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
A new approach for data hiding in gray-level images
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Increased capacity for information hiding using Walsh transform
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Secret communication via image hiding in image by pixel value differencing
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A new methodology for data coding and embedding for high-capacity transmitting
International Journal of Electronic Security and Digital Forensics
An improved asymmetric watermarking system using matrix embedding
IH'06 Proceedings of the 8th international conference on Information hiding
Analyzing network-aware active wardens in IPv6
IH'06 Proceedings of the 8th international conference on Information hiding
Bandwidth optimal steganography secure against adaptive chosen stegotext attacks
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Information hiding system stegoWaveK for improving capacity
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A security steganography method for lossy compression gray scale image
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Genetic algorithm based steganography using wavelets
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A steganographic computational paradigm for wireless sensor networks
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Data hiding using run length matching
International Journal of Intelligent Information and Database Systems
Variations on information embedding in multiple access and broadcast channels
IEEE Transactions on Information Theory
Network-based traitor-tracing technique using traffic pattern
IEEE Transactions on Information Forensics and Security
Some new methodologies for secured data coding and transmission
International Journal of Electronic Security and Digital Forensics
The square root law does not require a linear key
Proceedings of the 12th ACM workshop on Multimedia and security
Gray watermarks to prove the rightful ownership for digital coloured images
Proceedings of the 1st International Conference on Intelligent Semantic Web-Services and Applications
An adaptive steganographic method based on the measurement of just noticeable distortion profile
Image and Vision Computing
Journal of Visual Communication and Image Representation
A data hiding scheme using the varieties of pixel-value differencing in multimedia images
Journal of Systems and Software
Hamiltonian graph approach to steganography
International Journal of Electronic Security and Digital Forensics
Using LZW compression technique for payload encoding in multiple frequency domain steganography
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
A novel steganographic methodology for high capacity data hiding in executable files
International Journal of Internet Technology and Secured Transactions
SVD-wavelet algorithm for image compression
MIV'05 Proceedings of the 5th WSEAS international conference on Multimedia, internet & video technologies
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Data hiding in gray-scale images using pixel value differencing
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Protecting web images from attacks to prove the real owner
Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications
An efficient high payload ±1 data embedding scheme
Multimedia Tools and Applications
TAMC'11 Proceedings of the 8th annual conference on Theory and applications of models of computation
How quantization based schemes can be used in image steganographic context
Image Communication
An information hiding framework for lightweight mobile devices with digital camera
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
Cryptanalysis of “wavelet tree quantization” watermarking scheme
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
A new approach to estimating hidden message length in stochastic modulation steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Information transmission and steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Towards multi-class blind steganalyzer for JPEG images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Alternatives for multimedia messaging system steganography
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Color cube analysis for detection of LSB steganography in RGB color images
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
On steganographic chosen covertext security
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
IH'04 Proceedings of the 6th international conference on Information Hiding
Exploiting preserved statistics for steganalysis
IH'04 Proceedings of the 6th international conference on Information Hiding
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
Cryptanalysis of barni et al. watermarking scheme
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Abstract interpretation-based protection
VMCAI'10 Proceedings of the 11th international conference on Verification, Model Checking, and Abstract Interpretation
Public-key steganography with active attacks
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
High capacity and secured methodologies for steganography
International Journal of Electronic Security and Digital Forensics
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
VQ image steganographic method with high embedding capacity using multi-way search approach
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Cryptanalysis of a wavelet based watermarking scheme
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
IH'05 Proceedings of the 7th international conference on Information Hiding
Assessment of steganalytic methods using multiple regression models
IH'05 Proceedings of the 7th international conference on Information Hiding
Security evaluation of generalized patchwork algorithm from cryptanalytic viewpoint
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Data hiding in identification and offset IP fields
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Detection of illegal information flow
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Steganography for executables and code transformation signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Robust and secured image-adaptive data hiding
Digital Signal Processing
New image steganographic methods using run-length approach
Information Sciences: an International Journal
Provably secure steganography with imperfect sampling
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Traceroute based IP channel for sending hidden short messages
IWSEC'06 Proceedings of the 1st international conference on Security
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Provably secure steganography and the complexity of sampling
ISAAC'06 Proceedings of the 17th international conference on Algorithms and Computation
Multimedia data hiding in spatial and transformed domain
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Ensuring message embedding in wet paper steganography
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
A formulation of conditional states on steganalysis approach
WSEAS Transactions on Mathematics
Multimedia Tools and Applications
On the ability of adaptation of speech signals and data hiding
Expert Systems with Applications: An International Journal
Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing
Fundamenta Informaticae
Modular data hiding for improved web-portal security
Proceedings of the 13th International Conference on Computer Systems and Technologies
A Novel Steganographic Method with Four-Pixel Differencing and Modulus Function
Fundamenta Informaticae
Steganographic manipulations with elliptic curve cryptography
International Journal of Electronic Security and Digital Forensics
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Hiding Message in Map Along Pre-Hamiltonian Path
International Journal of Information Security and Privacy
Using Watermarking Techniques to prove Rightful Ownership of Web Images
International Journal of Information Technology and Web Engineering
Information Sciences: an International Journal
A steganalysis by adjacency pixel bits structure
Computers and Electrical Engineering
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Improving the embedding efficiency of weight matrix-based steganography for grayscale images
Computers and Electrical Engineering
Theoretical Computer Science
Blacknoise: lightweight low-fi steganography in defense of free speech
Proceedings of the 4th Annual Symposium on Computing for Development
Hi-index | 0.14 |
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a number of attacks, some new, on such information hiding schemes. This leads to a discussion of the formidable obstacles that lie in the way of a general theory of information hiding systems (in the sense that Shannon gave us a general theory of secrecy systems). However, theoretical considerations lead to ideas of practical value, such as the use of parity checks to amplify covertness and provide public key steganography. Finally, we show that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive