Results 1 - 10
of
13
Quantitative Structural Steganalysis of Jsteg
, 2010
"... Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new classes of quantitative steganalysis methods for the steganographic algorithm Jsteg. The first class obtains the changerate ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new classes of quantitative steganalysis methods for the steganographic algorithm Jsteg. The first class obtains
Applying LR Cube Analysis to JSteg Detection
"... Abstract. JSteg is a steganographic method for JPEG images that can be viewed as LSB steganography. Recently, we proposed a new principle to detect the use of LSB steganography in digitized vector signals and showed how to apply it to gray-scale images. In this paper, we discuss how to apply it to ..."
Abstract
- Add to MetaCart
Abstract. JSteg is a steganographic method for JPEG images that can be viewed as LSB steganography. Recently, we proposed a new principle to detect the use of LSB steganography in digitized vector signals and showed how to apply it to gray-scale images. In this paper, we discuss how to apply
A New Approach to Steganography using Sinc-Convolution Method
"... Abstract—Both image steganography and image encryption have advantages and disadvantages. Steganograhy allows us to hide a desired image containing confidential information in a covered or host image while image encryption is decomposing the desired image to a non-readable, non-comprehended manner. ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
of their weaknesses and therefore, it increases the security. In this paper an image encryption method based on sinc-convolution along with using an encryption key of 128 bit length is introduced. Then, the encrypted image is covered by a host image using a modified version of JSteg steganography algorithm
Weighted stego-image steganalysis for JPEG covers
- INFORMATION HIDING. LNCS 5284
, 2008
"... This paper contains two new results for the quantitative detector of LSB replacement steganography based on a weighted stegoimage (WS). First, for spatial domain steganalysis, a variant of the WS method is known to be highly accurate only when cover images have never been subject to lossy compress ..."
Abstract
-
Cited by 15 (2 self)
- Add to MetaCart
detect LSB replacement steganography in the transformed domain, and derive a reduced-form estimator for JSteg steganography which has equal or slightly better performance than the currently best JSteg detectors.
JPEG steganography: a performance evaluation of quantization tables
"... The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG tables within JPEG steganography. We found that usin ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG tables within JPEG steganography. We found
Steganalysis of QIM Steganography Using Irregularity Measure
"... This paper presents a nonparametric steganalysis technique to attack quantization index modulation (QIM) steganogra-phy and JSteg steganographic tool. The proposed scheme is based on the observation that message embedding using QIM introduces local irregularity (or randomness) in the cover-object. P ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
This paper presents a nonparametric steganalysis technique to attack quantization index modulation (QIM) steganogra-phy and JSteg steganographic tool. The proposed scheme is based on the observation that message embedding using QIM introduces local irregularity (or randomness) in the cover
Steganography Using Least Significant Bit Algorithm
, 2012
"... The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. One of the most important factors of information technology and communication has been the security of the information. For security purpose the concept of Steganography is ..."
Abstract
- Add to MetaCart
is being used. Steganography is art and science of invisible communication. Our paper deals with image steganography. Various steganographic algorithms like Least Significant Bit (LSB) algorithm, Jsteg and F5 algorithms, out of these we are using LSB algorithm. Steganography is the method through which
SPATIAL-SPECTRAL WATERMARKING SCHEME FOR JPEG STEGANOGRAPHY
"... Abstract: Steganography is the art of concealing the presence of a communication, across an open channel, from undesired parties. This is achieved by the encoding of message data in innocuous cover objects, such as JPEG digital images. Many JPEG steganography algorithms exist; most perform the enco ..."
Abstract
- Add to MetaCart
Abstract: Steganography is the art of concealing the presence of a communication, across an open channel, from undesired parties. This is achieved by the encoding of message data in innocuous cover objects, such as JPEG digital images. Many JPEG steganography algorithms exist; most perform
A JPEG STEGANOGRAPHIC METHOD BASED ON SYNDROME-TRELLIS CODES 1
"... Combining the Syndrome-Trellis Codes (STC) proposed recently, a new steganography method for JPEG images is presented in this paper. The method improves embedding efficiency by using the STC, and then preserves the DCT coefficient histogram statistic feature by constraining the proportion that are u ..."
Abstract
- Add to MetaCart
Combining the Syndrome-Trellis Codes (STC) proposed recently, a new steganography method for JPEG images is presented in this paper. The method improves embedding efficiency by using the STC, and then preserves the DCT coefficient histogram statistic feature by constraining the proportion
Steganalysis using Noise Variance Estimation
- in Image Processing, ICIP. IEEE International Conference on, vol.1, pp.417–420, IEEE
, 2007
"... ABSTRACT Steganography is the art and science of hiding information in an innocuous medium. Digital imagery is a medium with specific noise characteristics. The devices used to capture a digital image, such as the charge coupled device (CCD) in a digital camera is designed to have a relatively smal ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
an approach to estimate and model the noise present in an image. Using this estimation, it is shown how steganography introduces detectable changes to this natural noise. This approach is demonstrated on three freely available but difficult to detect embedding techniques, F5, JSteg, and Model-based embedding
Results 1 - 10
of
13