A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Support Vector Machines for Classification in Nonstandard Situations
Machine Learning
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A fast and effective steganalytic technique against JSteg-like algorithms
Proceedings of the 2003 ACM symposium on Applied computing
On Estimation of Secret Message Length in JSteg-like Steganography
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 4 - Volume 04
Perturbed quantization steganography with wet paper codes
Proceedings of the 2004 workshop on Multimedia and security
Minimizing the embedding impact in steganography
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Image steganalysis with binary similarity measures
EURASIP Journal on Applied Signal Processing
A Markov process based approach to effective attacking JPEG steganography
IH'06 Proceedings of the 8th international conference on Information hiding
On steganographic embedding efficiency
IH'06 Proceedings of the 8th international conference on Information hiding
Modified matrix encoding technique for minimal distortion steganography
IH'06 Proceedings of the 8th international conference on Information hiding
YASS: yet another steganographic scheme that resists blind steganalysis
IH'07 Proceedings of the 9th international conference on Information hiding
Generalised category attack: improving histogram-based attack on JPEG LSB embedding
IH'07 Proceedings of the 9th international conference on Information hiding
A graph–theoretic approach to steganography
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
IH'04 Proceedings of the 6th international conference on Information Hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
A general framework for structural steganalysis of LSB replacement
IH'05 Proceedings of the 7th international conference on Information Hiding
Category attack for LSB steganalysis of JPEG images
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Wet paper codes with improved embedding efficiency
IEEE Transactions on Information Forensics and Security
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Steganalysis for Markov cover data with applications to images
IEEE Transactions on Information Forensics and Security
The square root law of steganographic capacity
Proceedings of the 10th ACM workshop on Multimedia and security
Secure covert channels in multiplayer games
Proceedings of the 10th ACM workshop on Multimedia and security
On completeness of feature spaces in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Novelty detection in blind steganalysis
Proceedings of the 10th ACM workshop on Multimedia and security
Benchmarking for Steganography
Information Hiding
Secure Cover Selection Steganography
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Proceedings of the 11th ACM workshop on Multimedia and security
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
Proceedings of the 11th ACM workshop on Multimedia and security
Asymptotic behavior of the ZZW embedding construction
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Steganalysis by subtractive pixel adjacency matrix
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Quantitative steganalysis of LSB embedding in JPEG domain
Proceedings of the 12th ACM workshop on Multimedia and security
Steganography using Gibbs random fields
Proceedings of the 12th ACM workshop on Multimedia and security
An experimental study on the security performance of YASS
IEEE Transactions on Information Forensics and Security
Gibbs construction in steganography
IEEE Transactions on Information Forensics and Security
Using high-dimensional image models to perform highly undetectable steganography
IH'10 Proceedings of the 12th international conference on Information hiding
New JPEG steganographic scheme with high security performance
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Towards a protocol for autonomic covert communication
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
On dangers of overtraining steganography to incomplete cover model
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Stegobot: a covert social network botnet
IH'11 Proceedings of the 13th international conference on Information hiding
A network-flow-based method for embedding rectification
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
KL-sense secure image steganography
International Journal of Security and Networks
Ensuring message embedding in wet paper steganography
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
Batch steganography in the real world
Proceedings of the on Multimedia and security
Steganalysis with mismatched covers: do simple classifiers help?
Proceedings of the on Multimedia and security
An improved matrix encoding scheme for JPEG steganography
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
Steganographic algorithm based on parametric discrete cosine transform
Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and Image Processing
Benchmarking for steganography by kernel fisher discriminant criterion
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Digital image steganography using universal distortion
Proceedings of the first ACM workshop on Information hiding and multimedia security
Distortion function designing for JPEG steganography with uncompressed side-image
Proceedings of the first ACM workshop on Information hiding and multimedia security
Region of interest signalling for encrypted JPEG images
Proceedings of the first ACM workshop on Information hiding and multimedia security
Embedding change rate estimation based on ensemble learning
Proceedings of the first ACM workshop on Information hiding and multimedia security
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Steganalysis of F5-like steganography based on selection of joint distribution features
Proceedings of the Fifth International Conference on Internet Multimedia Computing and Service
New channel selection criterion for spatial domain steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An attempt to generalize distortion measure for JPEG steganography
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
A data hiding scheme based upon DCT coefficient modification
Computer Standards & Interfaces
Hi-index | 0.00 |
The goal of this paper is to determine the steganographic capacity of JPEG images (the largest payload that can be undetectably embedded) with respect to current best steganalytic methods. Additionally, by testing selected steganographic algorithms we evaluate the influence of specific design elements and principles, such as the choice of the JPEG compressor, matrix embedding, adaptive content-dependent selection channels, and minimal distortion steganography using side information at the sender. From our experiments, we conclude that the average steganographic capacity of grayscale JPEG images with quality factor 70 is approximately 0.05 bits per non-zero AC DCT coefficient.