LOF: identifying density-based local outliers
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Perturbation Hiding and the Batch Steganography Problem
Information Hiding
Batch steganography and pooled steganalysis
IH'06 Proceedings of the 8th international conference on Information hiding
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
IEEE Transactions on Information Forensics and Security - Part 2
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
We examine the universal pooled steganalyzer of in two respects. First, we confirm that the method is applicable to a number of different steganographic embedding methods. Second, we consider the converse problem of how to spread payload between multiple covers, by testing different payload allocation strategies against the universal steganalyzer. We focus on practical options which can be implemented without new software or expert knowledge, and we test on real-world data. Concentration of payload into the minimal number of covers is consistently the least detectable option. We present additional investigations which explain this phenomenon, uncovering a nonlinear relationship between embedding distortion and payload. We conjecture that this is an unavoidable consequence of blind steganalysis. This is significant for both batch steganography and pooled steganalysis.