The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
A universal statistical test for random bit generators
Journal of Cryptology
Modern Cryptography, Probabilistic Proofs, and Pseudorandomness
Modern Cryptography, Probabilistic Proofs, and Pseudorandomness
Practical Invisibility in Digital Communication
Proceedings of the First International Workshop on Information Hiding
Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals
Proceedings of the First International Workshop on Information Hiding
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
Introduction to the Practice of Statistics Minitab Manual and Minitab Version 14
Introduction to the Practice of Statistics Minitab Manual and Minitab Version 14
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A New Steganalysis Approach Based on Both Complexity Estimate and Statistical Filter
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Capacity is the wrong paradigm
Proceedings of the 2002 workshop on New security paradigms
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Locating secret messages in images
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
A hierarchical protocol for increasing the stealthiness of steganographic methods
Proceedings of the 2004 workshop on Multimedia and security
High-performance JPEG steganography using quantization index modulation in DCT domain
Pattern Recognition Letters
Searching and detecting spatial LSB steganographic images on the internet
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
A DCT-based Mod4 steganographic method
Signal Processing
Steganography obliterator: an attack on the least significant bits
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Least significant bit steganography detection with machine learning techniques
Proceedings of the 2007 international workshop on Domain driven data mining
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities
Proceedings of the 9th workshop on Multimedia & security
High-performance JPEG steganography using complementary embedding strategy
Pattern Recognition
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Proceedings of the 10th ACM workshop on Multimedia and security
Novelty detection in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
A Data Mapping Method for Steganography and Its Application to Images
Information Hiding
Benchmarking for Steganography
Information Hiding
Fusion Based Blind Image Steganalysis by Boosting Feature Selection
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Steganalysis of Multi Bit Plane Image Steganography
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Effect of Different Coding Patterns on Compressed Frequency Domain Based Universal JPEG Steganalysis
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
StegErmelc: A Novel DCT-Based Steganographic Method Using Three Strategies
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Efficient Parallel Feature Selection for Steganography Problems
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
e-Forensics steganography system for secret information retrieval
Advanced Engineering Informatics
IEEE Transactions on Information Forensics and Security
High payload steganography mechanism using hybrid edge detector
Expert Systems with Applications: An International Journal
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Performance comparison of DCT and Walsh transform for steganography
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
Advantages of using feature selection techniques on steganalysis schemes
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
A security steganography method for lossy compression gray scale image
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
An anti-statistical analysis LSB steganography incorporating extended cat-mapping
APPT'07 Proceedings of the 7th international conference on Advanced parallel processing technologies
Constructing good covering codes for applications in steganography
Transactions on data hiding and multimedia security III
Data embedding in JPEG bitstream by code mapping
IEEE Transactions on Image Processing
Reliable JPEG steganalysis based on multi-directional correlations
Image Communication
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
Concurrent covert communication channels
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
Neighboring joint density-based JPEG steganalysis
ACM Transactions on Intelligent Systems and Technology (TIST)
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Detecting double JPEG compression with the same quantization matrix
IEEE Transactions on Information Forensics and Security
Improved adaptive LSB steganography based on chaos and genetic algorithm
EURASIP Journal on Advances in Signal Processing - Special issue on advanced image processing for defense and security applications
Steganalysis using partially ordered Markov models
IH'10 Proceedings of the 12th international conference on Information hiding
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Ternary data hiding technique for JPEG steganography
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A more secure steganography based on adaptive pixel-value differencing scheme
Multimedia Tools and Applications
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Steganalysis of DCT-embedding based adaptive steganography and YASS
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
A progressive quality hiding strategy based on equivalence partitions of hiding units
Transactions on data hiding and multimedia security VI
An extended matrix encoding algorithm for steganography of high embedding efficiency
Computers and Electrical Engineering
Lossless data hiding in JPEG bitstream
Journal of Systems and Software
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Towards multi-class blind steganalyzer for JPEG images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Improved RS method for detection of LSB steganography
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
IH'04 Proceedings of the 6th international conference on Information Hiding
Information Sciences: an International Journal
JPEG2000 steganography possibly secure against histogram-based attack
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
Detection of hiding in the LSB of DCT coefficients
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part I
Minimizing the statistical impact of LSB steganography
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
Steganographic scheme using a block cipher
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Binary image steganographic techniques classification based on multi-class steganalysis
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
A feature selection methodology for steganalysis
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Multiple messages embedding using DCT-Based mod4 steganographic method
MRCS'06 Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Improving steganalysis by fusion techniques: a case study with image steganography
Transactions on Data Hiding and Multimedia Security I
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Multi bit plane image steganography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Universal JPEG steganalysis in the compressed frequency domain
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Batch steganography in the real world
Proceedings of the on Multimedia and security
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
A Novel bayesian classifier with smaller eigenvalues reset by threshold based on given database
ICIAR'07 Proceedings of the 4th international conference on Image Analysis and Recognition
Steganographic algorithm based on parametric discrete cosine transform
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Detection of StegoBot: a covert social network botnet
Proceedings of the First International Conference on Security of Internet of Things
Steganography content detection by means of feedforward neural network
International Journal of Innovative Computing and Applications
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Blacknoise: lightweight low-fi steganography in defense of free speech
Proceedings of the 4th Annual Symposium on Computing for Development
Pixel rearrangement based statistical restoration scheme reducing embedding noise
Multimedia Tools and Applications
Hi-index | 0.00 |
The main purpose of steganography is to hide the occurrence of communication. While most methods in use today are invisible to an observer's senses, mathematical analysis may reveal statistical anomalies in the stego medium. These discrepancies expose the fact that hidden communication is happening. This paper presents improved methods for information hiding. One method uses probabilistic embedding to minimize modifications to the cover medium. Another method employs error-correcting codes, which allow the embedding process to choose which bits to modify in a way that decreases the likelihood of being detected. In addition, we can hide multiple data sets in the same cover medium to provide plausible deniability. To prevent detection by statistical tests, we preserve the statistical properties of the cover medium. After applying a correcting transform to an image, statistical steganalysis is no longer able to detect the presence of steganography. We present an a priori estimate to determine the amount of data that can be hidden in the image while still being able to maintain frequency count based statistics. This way, we can quickly choose an image in which a message of a given size can be hidden safely. To evaluate the effectiveness of our approach, we present statistical tests for the JPEG image format and explain how our new method defeats them.