Practical Invisibility in Digital Communication
Proceedings of the First International Workshop on Information Hiding
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Distortion-Free Data Embedding for Images
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
Improving LSB steganalysis using marginal and joint probabilistic distributions
Proceedings of the 2004 workshop on Multimedia and security
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
Steganographic methods based on digital logic
SIP'07 Proceedings of the 6th Conference on 6th WSEAS International Conference on Signal Processing - Volume 6
A fast and effective method to detect multiple least significant bits steganography
Proceedings of the 2008 ACM symposium on Applied computing
Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images
Fundamenta Informaticae
Locating steganographic payload via ws residuals
Proceedings of the 10th ACM workshop on Multimedia and security
Detecting LSB matching by applying calibration technique for difference image
Proceedings of the 10th ACM workshop on Multimedia and security
Generic Adoption of Spatial Steganalysis to Transformed Domain
Information Hiding
Steganalysis of Multi Bit Plane Image Steganography
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Transactions on Data Privacy
Digital Watermarking and Steganography
Digital Watermarking and Steganography
A high-capacity steganography scheme for JPEG2000 baseline system
IEEE Transactions on Image Processing
High payload steganography mechanism using hybrid edge detector
Expert Systems with Applications: An International Journal
One-third probability embedding: Less detectable LSB steganography
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Minimizing the distortion spatial data hiding based on equivalence class
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
A fusion of maximum likelihood and structural steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
An anti-statistical analysis LSB steganography incorporating extended cat-mapping
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
Improving security of pixel value differencing steganographic method
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Data hiding in images based on tolerable error range
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Edge adaptive image steganography based on LSB matching revisited
IEEE Transactions on Information Forensics and Security
A method for automatic identification of signatures of steganography software
IEEE Transactions on Information Forensics and Security
Classification of steganalysis techniques: A study
Digital Signal Processing
Tradeoff between energy savings and privacy protection in computation offloading
Proceedings of the 16th ACM/IEEE international symposium on Low power electronics and design
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
Steganalysis of LSB matching based on statistical modeling of pixel difference distributions
Information Sciences: an International Journal
Quantitative structural steganalysis of Jsteg
IEEE Transactions on Information Forensics and Security
A steganographic scheme by fully exploiting modification directions
Expert Systems with Applications: An International Journal
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
A two-layer steganography scheme using sudoku for digital images
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO)
IH'11 Proceedings of the 13th international conference on Information hiding
A cover image model for reliable steganalysis
IH'11 Proceedings of the 13th international conference on Information hiding
Face recognition based on real AdaBoost and Kalman forecast
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part III
Exploring pixel-value differencing and base decomposition for low distortion data embedding
Applied Soft Computing
A new approach to estimating hidden message length in stochastic modulation steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Color cube analysis for detection of LSB steganography in RGB color images
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
A steganographic method for digital images robust to RS steganalysis
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Steganographic scheme using a block cipher
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
New steganalysis methodology: LR cube analysis for the detection of LSB steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
High-payload image hiding with quality recovery using tri-way pixel-value differencing
Information Sciences: an International Journal
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Parameter-estimation and algorithm-selection based United-Judgment for image steganalysis
Multimedia Tools and Applications
Robust and secured image-adaptive data hiding
Digital Signal Processing
Resampling operations as features for detecting LSB replacement and LSB matching in color images
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Steganalysis of adaptive image steganography in multiple gray code bit-planes
Multimedia Tools and Applications
Multimedia Tools and Applications
A novel technique for image steganography based on a high payload method and edge detection
Expert Systems with Applications: An International Journal
Generalizations of Pixel-Value Differencing Steganography for Data Hiding in Images
Fundamenta Informaticae
Data hiding method based on local image features
AMT'12 Proceedings of the 8th international conference on Active Media Technology
Active steganalysis for interpolation-error based reversible data hiding
Pattern Recognition Letters
Embedding change rate estimation based on ensemble learning
Proceedings of the first ACM workshop on Information hiding and multimedia security
Edge based steganography on colored images
ICIC'13 Proceedings of the 9th international conference on Intelligent Computing Theories
Wiretap-proof: what they hear is not what you speak, and what you speak they do not hear
Proceedings of the 4th ACM conference on Data and application security and privacy
A novel blind detector for additive noise steganography in JPEG decompressed images
Multimedia Tools and Applications
Data hiding by an improved exploiting modification direction
Multimedia Tools and Applications
Hi-index | 0.00 |
We describe a reliable and accurate method for detecting least significant bit (LSB) nonsequential embedding in digital images. The secret message length is derived by inspecting the lossless capacity in the LSB and shifted LSB plane. An upper bound of 0.005 bits per pixel was experimentally determined for safe LSB embedding.