Basic concepts in information theory and coding: the adventures of secret agent 00111
Basic concepts in information theory and coding: the adventures of secret agent 00111
Steganography Secure against Cover-Stego-Attacks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Detecting Steganographic Messages in Digital Images
Detecting Steganographic Messages in Digital Images
Reliable detection of LSB steganography in color and grayscale images
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Data Masking: A New Approach for Steganography?
Journal of VLSI Signal Processing Systems
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Proceedings of the 9th workshop on Multimedia & security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
A Data Mapping Method for Steganography and Its Application to Images
Information Hiding
How Reed-Solomon codes can improve steganographic schemes
EURASIP Journal on Information Security - Special issue on secure steganography in multimedia content
Digital Watermarking and Steganography
Digital Watermarking and Steganography
How can reed-Solomon codes improve steganographic schemes?
IH'07 Proceedings of the 9th international conference on Information hiding
Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector
Digital Signal Processing
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Exploiting preserved statistics for steganalysis
IH'04 Proceedings of the 6th international conference on Information Hiding
Pre-processing for adding noise steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
New steganalysis methodology: LR cube analysis for the detection of LSB steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
Hi-index | 0.00 |
Steganographic modifications must not noticeably change characteristics of the cover data known to an attacker. However, it is a difficult task to define an appropriate set of features that should be preserved. This article investigates possibilities to maintain statistical properties while embedding information. As an example, the simple embedding function "overwriting the least significant bits" is discussed, w.r.t. greyscale images used as covers. Two modifications of this technique are presented here: The first modification avoids changes of first-order statistics and thereby overcomes possible attacks based on histogram analysis. The second modification tries to reduce noticeable modifications of second-order statistics and, thereby, of the structure of an image. The suggested modifications are tested on a set of images. Testing a possible attack and comparing these results to the results of the same attack on stego images created by the original method clarifies the improvements.