Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
IH'04 Proceedings of the 6th international conference on Information Hiding
A general framework for structural steganalysis of LSB replacement
IH'05 Proceedings of the 7th international conference on Information Hiding
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Steganalysis for Markov cover data with applications to images
IEEE Transactions on Information Forensics and Security
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Generalization of the ZZW embedding construction for steganography
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Near-optimal codes for information embedding in gray-scale signals
IEEE Transactions on Information Theory
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
Ternary data hiding technique for JPEG steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A game-theoretic approach to content-adaptive steganography
IH'12 Proceedings of the 14th international conference on Information Hiding
A study of optimal matrix for efficient matrix embedding in F3
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.06 |
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a scalar value that measures the impact of making an embedding change at that pixel (e.g., the embedding distortion). Given the embedding impact profile of all pixels, we derive an analytic formula for the optimal number of pixels that should be used in combination with syndrome coding to minimize the overall embedding impact. We interpret the results and formulate several "rules of thumb" that should improve steganographic security. Contrary to what has been recommended in the literature before, our analysis implies that it is never optimal to only use the pixels with the smallest embedding impact. We also study q-ary embedding in the spatial domain and conclude that the smallest embedding impact is achieved for ternary schemes. This confirms some empirically derived facts previously published elsewhere.