Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Capacity is the wrong paradigm
Proceedings of the 2002 workshop on New security paradigms
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
High-performance JPEG steganography using quantization index modulation in DCT domain
Pattern Recognition Letters
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Fast communication: Steganography and error-correcting codes
Signal Processing
A DCT-based Mod4 steganographic method
Signal Processing
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
Least significant bit steganography detection with machine learning techniques
Proceedings of the 2007 international workshop on Domain driven data mining
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Image complexity and feature mining for steganalysis of least significant bit matching steganography
Information Sciences: an International Journal
A coding problem in steganography
Designs, Codes and Cryptography
Visual detection of LSB-encoded natural image steganography
ACM Transactions on Applied Perception (TAP)
Using nearest covering codes to embed secret information in grayscale images
Proceedings of the 2nd international conference on Ubiquitous information management and communication
High-performance JPEG steganography using complementary embedding strategy
Pattern Recognition
The square root law of steganographic capacity
Proceedings of the 10th ACM workshop on Multimedia and security
Secure covert channels in multiplayer games
Proceedings of the 10th ACM workshop on Multimedia and security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Proceedings of the 10th ACM workshop on Multimedia and security
Novelty detection in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Adaptive embedding techniques for VQ-compressed images
Information Sciences: an International Journal
Generic Adoption of Spatial Steganalysis to Transformed Domain
Information Hiding
A Data Mapping Method for Steganography and Its Application to Images
Information Hiding
Benchmarking for Steganography
Information Hiding
An improved steganalysis approach for breaking the F5 algorithm
WSEAS Transactions on Computers
Steganalysis of Multi Bit Plane Image Steganography
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Steganalysis of JPEG Images with Joint Transform Features
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Linear codes for high payload steganography
Discrete Applied Mathematics
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Product perfect codes and steganography
Digital Signal Processing
How Reed-Solomon codes can improve steganographic schemes
EURASIP Journal on Information Security - Special issue on secure steganography in multimedia content
Digital Watermarking and Steganography
Digital Watermarking and Steganography
A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme
Proceedings of the 2007 conference on Information Modelling and Knowledge Bases XVIII
Proceedings of the 11th ACM workshop on Multimedia and security
A New Hybrid DCT and Contourlet Transform Based JPEG Image Steganalysis Technique
SCIA '09 Proceedings of the 16th Scandinavian Conference on Image Analysis
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
Improved detection and evaluation for JPEG steganalysis
MM '09 Proceedings of the 17th ACM international conference on Multimedia
IEEE Transactions on Information Forensics and Security
On Using LSB Matching Function for Data Hiding in Pixels
Fundamenta Informaticae
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Constructing specific matrix for efficient matrix embedding
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Improving embedding efficiency by incorporating SDCS and WPC
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Performance comparison of DCT and Walsh transform for steganography
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
An improved approach to steganalysis of JPEG images
Information Sciences: an International Journal
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
On steganographic embedding efficiency
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
How can reed-Solomon codes improve steganographic schemes?
IH'07 Proceedings of the 9th international conference on Information hiding
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
Constructing good covering codes for applications in steganography
Transactions on data hiding and multimedia security III
Improved modification direction methods
Computers & Mathematics with Applications
Improving embedding efficiency via matrix embedding: a case study
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Data embedding in JPEG bitstream by code mapping
IEEE Transactions on Image Processing
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
A method for automatic identification of signatures of steganography software
IEEE Transactions on Information Forensics and Security
Classification of steganalysis techniques: A study
Digital Signal Processing
BSS: Boosted steganography scheme with cover image preprocessing
Expert Systems with Applications: An International Journal
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
The square root law does not require a linear key
Proceedings of the 12th ACM workshop on Multimedia and security
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
Concurrent covert communication channels
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Near-optimal codes for information embedding in gray-scale signals
IEEE Transactions on Information Theory
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Detecting double JPEG compression with the same quantization matrix
IEEE Transactions on Information Forensics and Security
Improved adaptive LSB steganography based on chaos and genetic algorithm
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Steganalysis using partially ordered Markov models
IH'10 Proceedings of the 12th international conference on Information hiding
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Ternary data hiding technique for JPEG steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A steganographic scheme by fully exploiting modification directions
Expert Systems with Applications: An International Journal
A more secure steganography based on adaptive pixel-value differencing scheme
Multimedia Tools and Applications
Minority codes with improved embedding efficiency for large payloads
Multimedia Tools and Applications
An information hiding scheme with minimal image distortion
Computer Standards & Interfaces
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
An efficient high payload ±1 data embedding scheme
Multimedia Tools and Applications
TAMC'11 Proceedings of the 8th annual conference on Theory and applications of models of computation
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Stegobot: a covert social network botnet
IH'11 Proceedings of the 13th international conference on Information hiding
A JPEG-based statistically invisible steganography
Proceedings of the Third International Conference on Internet Multimedia Computing and Service
A network-flow-based method for embedding rectification
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
A progressive quality hiding strategy based on equivalence partitions of hiding units
Transactions on data hiding and multimedia security VI
An extended matrix encoding algorithm for steganography of high embedding efficiency
Computers and Electrical Engineering
Lossless data hiding in JPEG bitstream
Journal of Systems and Software
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Towards multi-class blind steganalyzer for JPEG images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Alternatives for multimedia messaging system steganography
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
IH'04 Proceedings of the 6th international conference on Information Hiding
A compact covering method to exploit embedding capacity for matrix encoding
Information Sciences: an International Journal
JPEG2000 steganography possibly secure against histogram-based attack
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
A secure steganographic method on wavelet domain of palette-based images
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Detection of hiding in the LSB of DCT coefficients
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part I
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
IH'05 Proceedings of the 7th international conference on Information Hiding
Robust and secured image-adaptive data hiding
Digital Signal Processing
Binary image steganographic techniques classification based on multi-class steganalysis
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Multiple messages embedding using DCT-Based mod4 steganographic method
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Improving steganalysis by fusion techniques: a case study with image steganography
Transactions on Data Hiding and Multimedia Security I
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Multi bit plane image steganography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Universal JPEG steganalysis in the compressed frequency domain
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Ensuring message embedding in wet paper steganography
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Steganalysis of adaptive image steganography in multiple gray code bit-planes
Multimedia Tools and Applications
Multimedia Tools and Applications
Batch steganography in the real world
Proceedings of the on Multimedia and security
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A Novel bayesian classifier with smaller eigenvalues reset by threshold based on given database
ICIAR'07 Proceedings of the 4th international conference on Image Analysis and Recognition
Steganographic algorithm based on parametric discrete cosine transform
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Benchmarking for steganography by kernel fisher discriminant criterion
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
Region of interest signalling for encrypted JPEG images
Proceedings of the first ACM workshop on Information hiding and multimedia security
A high capacity lossless data hiding scheme for JPEG images
Journal of Systems and Software
Detection of StegoBot: a covert social network botnet
Proceedings of the First International Conference on Security of Internet of Things
Improving the embedding efficiency of weight matrix-based steganography for grayscale images
Computers and Electrical Engineering
Steganalysis of F5-like steganography based on selection of joint distribution features
Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service
An improved VLC-based lossless data hiding scheme for JPEG images
Journal of Systems and Software
A practical design of high-volume steganography in digital video files
Multimedia Tools and Applications
Cryptagram: photo privacy for online social media
Proceedings of the first ACM conference on Online social networks
Steganography content detection by means of feedforward neural network
International Journal of Innovative Computing and Applications
New channel selection criterion for spatial domain steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A study of optimal matrix for efficient matrix embedding in F3
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Theoretical Computer Science
Blacknoise: lightweight low-fi steganography in defense of free speech
Proceedings of the 4th Annual Symposium on Computing for Development
Secure computing with the MPEG RVC framework
Image Communication
A data hiding scheme based upon DCT coefficient modification
Computer Standards & Interfaces
Data hiding by an improved exploiting modification direction
Multimedia Tools and Applications
Hi-index | 0.06 |
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. The newly developed algorithm F5 withstands visual and statistical attacks, yet it still offers a large steganographic capacity. F5 implements matrix encoding to improve the efficiency of embedding. Thus it reduces the number of necessary changes. F5 employs permutative straddling to uniformly spread out the changes over the whole steganogram.