On the limits of steganography
IEEE Journal on Selected Areas in Communications
Statistical characterisation of MP3 encoders for steganalysis
Proceedings of the 2004 workshop on Multimedia and security
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
Searching and detecting spatial LSB steganographic images on the internet
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Near-optimal solution to pair-wise LSB matching via an immune programming strategy
Information Sciences: an International Journal
Quantization Step Parity-based Steganography for MP3 Audio
Fundamenta Informaticae
LTSB steganalysis based on quartic equation
Transactions on data hiding and multimedia security II
An anti-statistical analysis LSB steganography incorporating extended cat-mapping
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
A method for automatic identification of signatures of steganography software
IEEE Transactions on Information Forensics and Security
Classification of steganalysis techniques: A study
Digital Signal Processing
Concurrent covert communication channels
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Huffman table swapping-based steganograpy for MP3 audio
Multimedia Tools and Applications
Detecting MP3Stego and estimating the hidden size
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A chosen plaintext steganalysis of Hide4PGP v 2.0
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
A new approach to estimating hidden message length in stochastic modulation steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Color cube analysis for detection of LSB steganography in RGB color images
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
IH'04 Proceedings of the 6th international conference on Information Hiding
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
New steganalysis methodology: LR cube analysis for the detection of LSB steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
An analysis of empirical PMF based tests for least significant bit image steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
Resampling operations as features for detecting LSB replacement and LSB matching in color images
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Equivalence analysis among DIH, SPA, and RS steganalysis methods
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Attack on JPEG2000 steganography using LRCA
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Quantization Step Parity-based Steganography for MP3 Audio
Fundamenta Informaticae
Steganalysis for MP3Stego using differential statistics of quantization step
Digital Signal Processing
Hi-index | 0.00 |
This paper shows three approaches for detecting steganograms with low change density. MP3Stego is a steganographic algorithm with a very low embedding rate. The attack presented here is a statistical analysis of block sizes. It is able to detect 0.001 % of steganographic payload in MP3 files. The second approach is the use of hash functions to combine sample categories for the chi-square attack. One of these hash functions enables us to detect about 0.2 bits per pixel in true colour images. Another algorithm (Hide) was presented at the last workshop and constructed to be secure against visual and statistical chi-square attacks. The detection method for Hide combines the three colour components of each pixel to recognise an increased number of "neighbour colours".