IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Error Control Coding, Second Edition
Error Control Coding, Second Edition
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Fast BCH Syndrome Coding for Steganography
Information Hiding
A Novel Approach for JPEG Steganography
Digital Watermarking
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Reducing the complexity of syndrome coding for embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Steganography using Gibbs random fields
Proceedings of the 12th ACM workshop on Multimedia and security
IH'04 Proceedings of the 6th international conference on Information Hiding
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
In this paper, we present several methods to improve performance of the existing data hiding method for JPEG steganography. Recent JPEG steganographic methods usually exploit minimum distortion strategy, where each DCT coefficients has predefined distortion value. Such strategy uses the best solution for data hiding with minimum cumulative distortion. Steganographic methods based on hiding data using the best solution with minimum distortion have better chance to pass powerful steganalysis presented in literature. Thus, the key point for such methods is a way to compute distortion for each DCT coefficient. In this paper, we present three different ways to compute distortion and search for parameters, where proposed functions show the best results. BCH-based method has been used as a tool for data hiding. Experimental results show that the presented distortion functions with the best parameters show better results compared to traditional approaches.