An information-theoretic model for steganography
Information and Computation
Batch steganography and pooled steganalysis
IH'06 Proceedings of the 8th international conference on Information hiding
An improved sample pairs method for detection of LSB embedding
IH'04 Proceedings of the 6th international conference on Information Hiding
A general framework for structural steganalysis of LSB replacement
IH'05 Proceedings of the 7th international conference on Information Hiding
Detection of LSB steganography via sample pair analysis
IEEE Transactions on Signal Processing
Derivation of Error Distribution in Least Squares Steganalysis
IEEE Transactions on Information Forensics and Security
Matrix embedding for large payloads
IEEE Transactions on Information Forensics and Security
Divergence Estimation of Continuous Distributions Based on Data-Dependent Partitions
IEEE Transactions on Information Theory
The square root law of steganographic capacity
Proceedings of the 10th ACM workshop on Multimedia and security
Practical Insecurity for Effective Steganalysis
Information Hiding
Benchmarking for Steganography
Information Hiding
Estimating the Information Theoretic Optimal Stego Noise
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
Progressive randomization: Seeing the unseen
Computer Vision and Image Understanding
The square root law does not require a linear key
Proceedings of the 12th ACM workshop on Multimedia and security
Vision of the unseen: Current trends and challenges in digital image and video forensics
ACM Computing Surveys (CSUR)
Digital image steganography using universal distortion
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.01 |
We present a new benchmark for binary steganalysis methods, based on the asymptotic information (in the entropic sense) it gives about the presence of hidden data. The theoretical foundation is quite unlike ad hoc performance measures found in steganalysis literature that are based on false positive and negative rates. It is argued that this new metric is an application-independent long-run measure of true performance. There are some challenges to computing the benchmark empirically, and some suggested methods are presented, but no definitive answer emerges. As a simple case study, some steganalysis methods from the literature are evaluated using these techniques.