A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A Novel Scheme for Securing Image Steganography
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Capacity is the wrong paradigm
Proceedings of the 2002 workshop on New security paradigms
An iterative method of palette-based image steganography
Pattern Recognition Letters
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
Robust object-based watermarking scheme via shape self-similarity segmentation
Pattern Recognition Letters
Capacity of steganographic channels
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Secret image sharing with smaller shadow images
Pattern Recognition Letters
Audio steganography using bit modification
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
Visual detection of LSB-encoded natural image steganography
ACM Transactions on Applied Perception (TAP)
High capacity data embedding using colour palette decomposition
SPPR'07 Proceedings of the Fourth conference on IASTED International Conference: Signal Processing, Pattern Recognition, and Applications
Adaptive lossless steganographic scheme with centralized difference expansion
Pattern Recognition
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
Frequency-domain data hiding based on the Matryoshka principle
International Journal of Advanced Media and Communication
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
Review: A review on blind detection for image steganography
Signal Processing
Methods for image authentication: a survey
Multimedia Tools and Applications
Sharing secrets in stego images with authentication
Pattern Recognition
Adaptive embedding techniques for VQ-compressed images
Information Sciences: an International Journal
IEICE - Transactions on Information and Systems
Secret image sharing based on cellular automata and steganography
Pattern Recognition
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
A high capacity reversible data hiding scheme with edge prediction and difference expansion
Journal of Systems and Software
Capacity of steganographic channels
IEEE Transactions on Information Theory
A lossless robust data hiding scheme
Pattern Recognition
High capacity data embedding using Colour Palette Decomposition
SPPRA '07 Proceedings of the Fourth IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Benchmarking tools for fairly comparing watermarking algorithms
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Progressive sharing for a secret image
Journal of Systems and Software
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
A new methodology for data coding and embedding for high-capacity transmitting
International Journal of Electronic Security and Digital Forensics
Steganography for radio amateurs: a DSSS based approach for slow scan television
IH'06 Proceedings of the 8th international conference on Information hiding
Information Sciences: an International Journal
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Tri-layer stego for enhanced security: a keyless random approach
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Classification of steganalysis techniques: A study
Digital Signal Processing
BSS: Boosted steganography scheme with cover image preprocessing
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
An adaptive steganographic method based on the measurement of just noticeable distortion profile
Image and Vision Computing
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
A review of the audio and video steganalysis algorithms
Proceedings of the 48th Annual Southeast Regional Conference
Comments on matrix-based secret sharing scheme for images
CIARP'10 Proceedings of the 15th Iberoamerican congress conference on Progress in pattern recognition, image analysis, computer vision, and applications
A verifiable secret sharing scheme based on AMBTC
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
High capacity robust data hiding system based on BPCS and IWT
MUSP'06 Proceedings of the 6th WSEAS international conference on Multimedia systems & signal processing
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A new approach to estimating hidden message length in stochastic modulation steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
On sequence synchronization analysis against chaos based spread spectrum image steganography
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Non-cryptographic methods for improving real time transmission security and integrity
Annales UMCS, Informatica - Security Systems
Data hiding in identification and offset IP fields
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Robust approaches to 3d object secret sharing
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part I
Tamper-proof image watermarking using self-embedding
Proceedings of the ACM SIGKDD Workshop on Intelligence and Security Informatics
Benchmarking for steganography by kernel fisher discriminant criterion
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Digital Image Authentication: A Review
International Journal of Digital Library Systems
A novel blind detector for additive noise steganography in JPEG decompressed images
Multimedia Tools and Applications
Hi-index | 0.08 |
We present a new method of digital steganography, entitled spread spectrum image steganography (SSIS). Steganography, which means “covered writing” in Greek, is the science of communicating in a hidden manner. Following a discussion of steganographic communication theory and review of existing techniques, the new method, SSIS, is introduced. This system hides and recovers a message of substantial length within digital imagery while maintaining the original image size and dynamic range. The hidden message can be recovered using appropriate keys without any knowledge of the original image. Image restoration, error-control coding, and techniques similar to spread spectrum are described, and the performance of the system is illustrated. A message embedded by this method can be in the form of text, imagery, or any other digital signal. Applications for such a data-hiding scheme include in-band captioning, covert communication, image tamperproofing, authentication, embedded control, and revision tracking