• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13
Next 10 →

Quantitative Structural Steganalysis of Jsteg

by Jan Kodovský, Jessica Fridrich , 2010
"... Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new classes of quantitative steganalysis methods for the steganographic algorithm Jsteg. The first class obtains the changerate ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new classes of quantitative steganalysis methods for the steganographic algorithm Jsteg. The first class obtains

Applying LR Cube Analysis to JSteg Detection

by Kwangsoo Lee , Changho Jung , Sangjin Lee , Hyungjun Kim , Jongin Lim
"... Abstract. JSteg is a steganographic method for JPEG images that can be viewed as LSB steganography. Recently, we proposed a new principle to detect the use of LSB steganography in digitized vector signals and showed how to apply it to gray-scale images. In this paper, we discuss how to apply it to ..."
Abstract - Add to MetaCart
Abstract. JSteg is a steganographic method for JPEG images that can be viewed as LSB steganography. Recently, we proposed a new principle to detect the use of LSB steganography in digitized vector signals and showed how to apply it to gray-scale images. In this paper, we discuss how to apply

A New Approach to Steganography using Sinc-Convolution Method

by Ahmad R. Naghsh-nilchi, Latifeh Pourmohammadbagher
"... Abstract—Both image steganography and image encryption have advantages and disadvantages. Steganograhy allows us to hide a desired image containing confidential information in a covered or host image while image encryption is decomposing the desired image to a non-readable, non-comprehended manner. ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
of their weaknesses and therefore, it increases the security. In this paper an image encryption method based on sinc-convolution along with using an encryption key of 128 bit length is introduced. Then, the encrypted image is covered by a host image using a modified version of JSteg steganography algorithm

Weighted stego-image steganalysis for JPEG covers

by Rainer Böhme - INFORMATION HIDING. LNCS 5284 , 2008
"... This paper contains two new results for the quantitative detector of LSB replacement steganography based on a weighted stegoimage (WS). First, for spatial domain steganalysis, a variant of the WS method is known to be highly accurate only when cover images have never been subject to lossy compress ..."
Abstract - Cited by 15 (2 self) - Add to MetaCart
detect LSB replacement steganography in the transformed domain, and derive a reduced-form estimator for JSteg steganography which has equal or slightly better performance than the currently best JSteg detectors.

JPEG steganography: a performance evaluation of quantization tables

by Adel Almohammad, Gheorghita Ghinea, Robert M. Hierons
"... The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG tables within JPEG steganography. We found that usin ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and efficiency of using optimized quantization tables instead of default JPEG tables within JPEG steganography. We found

Steganalysis of QIM Steganography Using Irregularity Measure

by Hafiz Malik
"... This paper presents a nonparametric steganalysis technique to attack quantization index modulation (QIM) steganogra-phy and JSteg steganographic tool. The proposed scheme is based on the observation that message embedding using QIM introduces local irregularity (or randomness) in the cover-object. P ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
This paper presents a nonparametric steganalysis technique to attack quantization index modulation (QIM) steganogra-phy and JSteg steganographic tool. The proposed scheme is based on the observation that message embedding using QIM introduces local irregularity (or randomness) in the cover

Steganography Using Least Significant Bit Algorithm

by Mrs Kavitha, Kavita Kadam, Ashwini Koshti, Priya Dunghav , 2012
"... The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. One of the most important factors of information technology and communication has been the security of the information. For security purpose the concept of Steganography is ..."
Abstract - Add to MetaCart
is being used. Steganography is art and science of invisible communication. Our paper deals with image steganography. Various steganographic algorithms like Least Significant Bit (LSB) algorithm, Jsteg and F5 algorithms, out of these we are using LSB algorithm. Steganography is the method through which

SPATIAL-SPECTRAL WATERMARKING SCHEME FOR JPEG STEGANOGRAPHY

by Bradley Marques , Benjamin Sim , Ling Cheng
"... Abstract: Steganography is the art of concealing the presence of a communication, across an open channel, from undesired parties. This is achieved by the encoding of message data in innocuous cover objects, such as JPEG digital images. Many JPEG steganography algorithms exist; most perform the enco ..."
Abstract - Add to MetaCart
Abstract: Steganography is the art of concealing the presence of a communication, across an open channel, from undesired parties. This is achieved by the encoding of message data in innocuous cover objects, such as JPEG digital images. Many JPEG steganography algorithms exist; most perform

A JPEG STEGANOGRAPHIC METHOD BASED ON SYNDROME-TRELLIS CODES 1

by Ye Xueyi, Lu Guopeng, Wang Yunlu, Zhang Yan
"... Combining the Syndrome-Trellis Codes (STC) proposed recently, a new steganography method for JPEG images is presented in this paper. The method improves embedding efficiency by using the STC, and then preserves the DCT coefficient histogram statistic feature by constraining the proportion that are u ..."
Abstract - Add to MetaCart
Combining the Syndrome-Trellis Codes (STC) proposed recently, a new steganography method for JPEG images is presented in this paper. The method improves embedding efficiency by using the STC, and then preserves the DCT coefficient histogram statistic feature by constraining the proportion

Steganalysis using Noise Variance Estimation

by Christopher B Smith - in Image Processing, ICIP. IEEE International Conference on, vol.1, pp.417–420, IEEE , 2007
"... ABSTRACT Steganography is the art and science of hiding information in an innocuous medium. Digital imagery is a medium with specific noise characteristics. The devices used to capture a digital image, such as the charge coupled device (CCD) in a digital camera is designed to have a relatively smal ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
an approach to estimate and model the noise present in an image. Using this estimation, it is shown how steganography introduces detectable changes to this natural noise. This approach is demonstrated on three freely available but difficult to detect embedding techniques, F5, JSteg, and Model-based embedding
Next 10 →
Results 1 - 10 of 13
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University