Steganography Preserving Statistical Properties
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A new approach to reliable detection of LSB steganography in natural images
Signal Processing - Special section: Security of data hiding technologies
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
The capability of image in hiding a secret message
SSIP'06 Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing
Review: A review on blind detection for image steganography
Signal Processing
An improved steganalysis approach for breaking the F5 algorithm
WSEAS Transactions on Computers
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
A wavelet-based blind JPEG image steganalysis uing co-occurrence matrix
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
IWDW'02 Proceedings of the 1st international conference on Digital watermarking
A new steganalytic algorithm for detecting jsteg
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Resampling operations as features for detecting LSB replacement and LSB matching in color images
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Hi-index | 0.00 |
Techniques and applications for information hiding have become increasingly more sophisticated and widespread. With high-resolution digital images as carriers, detecting the presence of hidden messages has also become considerably more difficult. It is sometimes possible, nevertheless, to detect (but not necessarily decipher) the presence of embedded messages. The basic approach taken here works by finding predictable higher-order statistics of ``natural'''' images within a multi-scale decomposition, and then showing that embedded messages alter these statistics.