IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Proceedings of the First International Workshop on Information Hiding
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Joel on Software: Selected Essays
Joel on Software: Selected Essays
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
IP covert timing channels: design and detection
Proceedings of the 11th ACM conference on Computer and communications security
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Proceedings of the 9th workshop on Multimedia & security
Locating steganographic payload via ws residuals
Proceedings of the 10th ACM workshop on Multimedia and security
The square root law of steganographic capacity
Proceedings of the 10th ACM workshop on Multimedia and security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Novelty detection in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
A Supraliminal Channel in a Videoconferencing Application
Information Hiding
Kernel methods in steganalysis
Kernel methods in steganalysis
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Fisher Information Determines Capacity of ε-Secure Steganography
Information Hiding
Estimating the Information Theoretic Optimal Stego Noise
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Video steganalysis using motion estimation
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Batch steganography and pooled steganalysis
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
A method for automatic identification of signatures of steganography software
IEEE Transactions on Information Forensics and Security
Advanced Statistical Steganalysis
Advanced Statistical Steganalysis
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A square-root law for active wardens
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Statistical decision methods in hidden information detection
IH'11 Proceedings of the 13th international conference on Information hiding
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
Steganalysis in the presence of weak cryptography and encoding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Provably secure steganography and the complexity of sampling
ISAAC'06 Proceedings of the 17th international conference on Algorithms and Computation
Learning non-local range Markov Random field for image restoration
CVPR '11 Proceedings of the 2011 IEEE Conference on Computer Vision and Pattern Recognition
The CFAR adaptive subspace detector is a scale-invariant GLRT
IEEE Transactions on Signal Processing
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Multiclass Detector of Current Steganographic Methods for JPEG Format
IEEE Transactions on Information Forensics and Security
Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain
IEEE Transactions on Information Forensics and Security
Detection of Double-Compression in JPEG Images for Applications in Steganography
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Theory
A Neyman-Pearson approach to statistical learning
IEEE Transactions on Information Theory
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes
IEEE Transactions on Information Forensics and Security - Part 2
Batch steganography in the real world
Proceedings of the on Multimedia and security
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
Forensics Aided Steganalysis of Heterogeneous Bitmap Images with Different Compression History
MINES '12 Proceedings of the 2012 Fourth International Conference on Multimedia Information Networking and Security
Hi-index | 0.00 |
There has been an explosion of academic literature on steganography and steganalysis in the past two decades. With a few exceptions, such papers address abstractions of the hiding and detection problems, which arguably have become disconnected from the real world. Most published results, including by the authors of this paper, apply "in laboratory conditions" and some are heavily hedged by assumptions and caveats; significant challenges remain unsolved in order to implement good steganography and steganalysis in practice. This position paper sets out some of the important questions which have been left unanswered, as well as highlighting some that have already been addressed successfully, for steganography and steganalysis to be used in the real world.