Applications of coding theory to communication combinatorial problems
Discrete Mathematics - Coding Theory
On the rank of random matrices
Random Structures & Algorithms
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Random Krylov Spaces over Finite Fields
SIAM Journal on Discrete Mathematics
Solving Large Sparse Linear Systems over Finite Fields
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Secure Steganographic Methods for Palette Images
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganography Preserving Statistical Properties
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
IH'04 Proceedings of the 6th international conference on Information Hiding
Exploiting preserved statistics for steganalysis
IH'04 Proceedings of the 6th international conference on Information Hiding
IEEE Transactions on Signal Processing - Part II
IEEE Transactions on Information Theory
Nested linear/lattice codes for structured multiterminal binning
IEEE Transactions on Information Theory
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
On the limits of steganography
IEEE Journal on Selected Areas in Communications
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Least significant bit steganography detection with machine learning techniques
Proceedings of the 2007 international workshop on Domain driven data mining
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Secure Cover Selection Steganography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Improved embedding based on a set of cover images
Proceedings of the 11th ACM workshop on Multimedia and security
On steganographic embedding efficiency
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Reducing the complexity of syndrome coding for embedding
IH'07 Proceedings of the 9th international conference on Information hiding
A novel universal steganalyser design: "LogSv"
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
SVD-based universal spatial domain image steganalysis
IEEE Transactions on Information Forensics and Security
BSS: Boosted steganography scheme with cover image preprocessing
Expert Systems with Applications: An International Journal
CBS: Contourlet-Based Steganalysis Method
Journal of Signal Processing Systems
Concurrent covert communication channels
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Generalization and analysis of the paper folding method for steganography
IEEE Transactions on Information Forensics and Security
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Video steganography with perturbed motion estimation
IH'11 Proceedings of the 13th international conference on Information hiding
An extended matrix encoding algorithm for steganography of high embedding efficiency
Computers and Electrical Engineering
Information transmission and steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Pre-processing for adding noise steganography
IH'05 Proceedings of the 7th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Towards lower bounds on embedding distortion in information hiding
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
Improving the embedding efficiency of weight matrix-based steganography for grayscale images
Computers and Electrical Engineering
New channel selection criterion for spatial domain steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Blacknoise: lightweight low-fi steganography in defense of free speech
Proceedings of the 4th Annual Symposium on Computing for Development
Hi-index | 0.00 |
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having to share the selection channel with the recipient. An appropriate information-theoretical model for this communication is writing in memory with (a large number of) defective cells [1]. We describe a simple variable-rate random linear code for this channel (the "wet paper" code) and use it to develop a new steganographic methodology for digital media files - Perturbed Quantization. In Perturbed Quantization, the sender hides data while processing the cover object with an information-reducing operation, such as lossy compression, downsampling, A/D conversion, etc. The sender uses the cover object before processing as side information to confine the embedding changes to those elements of the processed cover object whose values are the most "uncertain". This informed-sender embedding and uninformed-recipient message extraction improves steganographic security because an attacker cannot easily determine from the processed stego object the location of embedding changes. Heuristic is presented and supported by blind steganalysis [2] that a specific case of Perturbed Quantization for JPEG images is significantly less detectable than current JPEG steganographic methods.