288 Hits in 4.9 sec

Locally most-powerful detector for secret key estimation in spread spectrum image steganography

Shalin P. Trivedi, Rajarathnam Chandramouli, Edward J. Delp III, Ping W. Wong
2004 Security, Steganography, and Watermarking of Multimedia Contents VI  
Performance bounds on optimal watermark synchronizers p. 827Malicious attacks on media authentication schemes based on invertible watermarks p. 838Evaluating the performance of ST-DM watermarking in nonadditive  ...  p. 772 Geometric soft hash functions for 2D and 3D objects p. 784 Statistical amplitude scale estimation for quantization-based watermarking p. 796 Blind iterative decoding of side-informed data  ... 
doi:10.1117/12.521394 dblp:conf/sswmc/TrivediC04 fatcat:nxfcw6hmrvcpthtwevgzkbhioq

Moving steganography and steganalysis from the laboratory into the real world

Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomáš Pevný
2013 Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13  
There has been an explosion of academic literature on steganography and steganalysis in the past two decades.  ...  to implement good steganography and steganalysis in practice.  ...  Acknowledgments The work of A. Ker and T.  ... 
doi:10.1145/2482513.2482965 dblp:conf/ih/KerBBCCFFP13 fatcat:pdf3gedtzre6vg33kkeu6nm3oq

Information-Theoretic Limits for Steganography in Multimedia [article]

Hassan Y. El-Arsh, Amr Abdelaziz, Ahmed Elliethy, Hussein A. Aly
2021 arXiv   pre-print
There exist many techniques for performing steganography in both the literature and the practical world.  ...  Steganography is the art and science of hiding data within innocent-looking objects (cover objects).  ...  mutual information between statistical distributions of the cover and stego-objects.  ... 
arXiv:2111.04960v1 fatcat:ahkzkf7hfrgzfhfjcuh4g5xxga

Steganographic Method of Data Hiding using JPEG Images

2015 International Journal of Science and Research (IJSR)  
Steganography is an art of concealing the fact that communication is taking place, by hiding information in other information.  ...  This paper gives an overview of steganographic method in which we hide both text message and digital image in another digital image.  ...  bounds.  ... 
doi:10.21275/v4i11.nov151370 fatcat:tg2mesvysjfqhdlzkkadgszqqq

Digital Video Steganalysis Exploiting Statistical Visibility in the Temporal Domain

Udit Budhia, Deepa Kundur, Takis Zourntos
2006 IEEE Transactions on Information Forensics and Security  
Index Terms-Collusion attack, information forensics, pattern recognition, video steganalysis, video steganography.  ...  Our performance gains are achieved by exploiting the collusion attack that has recently been studied in the field of digital video watermarking and pattern recognition tools.  ...  Farid, for handling the review of this paper as well as the three anonymous reviewers for their useful comments.  ... 
doi:10.1109/tifs.2006.885020 fatcat:gug4wrhpmjazxnirr576xjfcxu

On the Relationship Between Embedding Costs and Steganographic Capacity

Andrew D. Ker
2018 Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '18  
Contemporary steganography in digital media is dominated by the framework of additive distortion minimization: every possible change is given a cost, and the embedder minimizes total cost using some variant  ...  We consider a 'knowing' detector who is aware of the embedding costs, in which case π 2 i c i should be optimized.  ...  ACKNOWLEDGMENTS The author thanks Patrick Bas and Jessica Fridrich, who independently asked him about the relationship between embedding capacity and costs, prompting this work.  ... 
doi:10.1145/3206004.3206017 dblp:conf/ih/Ker18 fatcat:w55oolmb3fd5hk7ywapsgie2r4

Image Steganography and Steganalysis: A Survey

Yambem JinaChanu, Kh. Manglem Singh, Themrichon Tuithung
2012 International Journal of Computer Applications  
Steganography refers to the technique of hiding secret messages into media such as text, audio, image and video without any suspicion, while steganalysis is the art and science of detection of the presence  ...  of steganography.  ...  Classify into a number of contiguous ranges, ( ) where the width of is a power of 2. The lower bound, upper bound and width of are denoted by , and respectively.  ... 
doi:10.5120/8171-1484 fatcat:jdrgk5sdefhbvcvzdic77pqnbq

Extreme learning machine based optimal embedding location finder for image steganography

Hayfaa Abdulzahra Atee, Robiah Ahmad, Norliza Mohd Noor, Abdul Monem S. Rahma, Yazan Aljeroudi, Zhaohong Deng
2017 PLoS ONE  
The performance of the proposed steganography approach is evaluated by computing the correlation, structural similarity (SSIM) index, fusion matrices, and mean square error (MSE).  ...  Excellent features of the experimental results demonstrate that the proposed steganographic approach is greatly proficient for preserving the visual information of an image.  ...  and determination of the lower and upper bounds of embedding capacity [34] .  ... 
doi:10.1371/journal.pone.0170329 pmid:28196080 pmcid:PMC5308843 fatcat:7y6loyxa7vdtzodtk3jj3stkxa

Front Matter: Volume 6505

Proceedings of SPIE
2007 Security, Steganography, and Watermarking of Multimedia Contents IX  
The papers published in these proceedings reflect the work and thoughts of the authors and are published herein as submitted.  ...  The publishers are not responsible for the validity of the information or for any outcomes resulting from reliance thereon. Please use the following format to cite material from this book:  ...  Welcome to the Security, Steganography, and Watermarking of Multimedia Contents Conference!  ... 
doi:10.1117/12.731272 fatcat:w6tuidlgrzgndnobbfqu4falb4

Steganographic strategies for a square distortion function

Andrew D. Ker, Edward J. Delp III, Ping Wah Wong, Jana Dittmann, Nasir D. Memon
2008 Security, Forensics, Steganography, and Watermarking of Multimedia Contents X  
Recent results on the information theory of steganography suggest, and under some conditions prove, that the detectability of payload is proportional to the square of the number of changes caused by the  ...  A number of variants are considered: embedding with and without adaptive source coding, in uniform and nonuniform covers, and embedding in both a fixed number of covers (so-called batch steganography)  ...  Theorems 7 and 9 were proved with the assistance of Michael Collins and Roger Heath-Brown.  ... 
doi:10.1117/12.765913 dblp:conf/sswmc/Ker08 fatcat:bxbwcpe7j5evtdbfxnhrzhlpoi

Digital Watermarking – A Multidisciplinary Approach

L. Venkateswarlu, CVR College of Engineering, Department of CSE, Ibrahimpatan, R.R. District, A.P., India, Dr. N V Rao, CVR College of Engineering, Department of CSE, Ibrahimpatan, R.R. District, A.P., India
2013 CVR Journal of Science & Technology  
, Mathematics and Statistics.  ...  For the last six decades, Digital Watermarking, as an art of hiding information in a cover or host image has drawn much attention of researchers from academic institutions and industry.  ...  The upper bound on this mutual information is the data hiding capacity.  ... 
doi:10.32377/cvrjst0504 fatcat:2hgsh6u3xngqbeksyy4qboegvm

Introduction to the special issue on information-theoretic imaging

D.L. Snyder, A.O. Hero, P. Moulin, J.M.F. Moura, J.A. O'Sullivan
2000 IEEE Transactions on Information Theory  
Recent research has addressed two categories of problems: novel applications of fundamental statistical and information-theoretic principles to imaging; and exploring optimal and suboptimal methods for  ...  The performance of estimation problems is often quantified using Fisher information and Cramér-Rao bounds. Several papers refer to such bounds, including Permuter and Francos.  ...  high-density attenuators; information-theoretic approaches to hyperspectral imaging; physics-based capacity bounds for magnetic media; derivation and analysis of alternating minimization algorithms; information-theoretic  ... 
doi:10.1109/tit.2000.857785 fatcat:y66g7jdj5bcaphwnmuhz7qdbva

Uniform Embedding for Efficient JPEG Steganography

Linjie Guo, Jiangqun Ni, Yun Qing Shi
2014 IEEE Transactions on Information Forensics and Security  
In this paper, a class of new distortion functions known as uniform embedding distortion function (UED) is presented for both side-informed and non side-informed secure JPEG steganography.  ...  Steganography is the science and art of covert communication, which aims to hide the secret messages into a cover medium while achieving the least possible statistical detectability.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and associate editor for their comments that greatly improved the manuscript.  ... 
doi:10.1109/tifs.2014.2312817 fatcat:uuj2gcycdnfehcmqtylazbnmca

Detection of Stego-Images in Communication among the Terrorist Boko-Haram Sect in Nigeria

Owoeye Kolade, Ajayi Adedoyin Olayinka, Fadugba Sunday, Obayomi Adesoji, Isinkaye Folasade Olubusola
2015 Journal of Data Analysis and Information Processing  
The result shows that the performance of the method is better than other steganalysis methods.  ...  It has also been discovered that the group employs "steganographic" schemes as a secure means for transmitting their hidden information to each other via Internet and social networks.  ...  However, the methods based on wavelet high order statistics could not perform very well on spatial domain steganography such as LSB steganography [17] .  ... 
doi:10.4236/jdaip.2015.34017 fatcat:36vhsnojpfcoxh5ihy4gggnrxa

Can Machine Learn Steganography? - Implementing LSB Substitution and Matrix Coding Steganography with Feed-Forward Neural Networks [article]

Han-Zhou Wu, Hong-Xia Wang, Yun-Qing Shi
2016 arXiv   pre-print
Our experimental results have shown that, the used FNNs can achieve the data embedding operation of the LSB substitution and matrix coding steganography.  ...  In recent years, due to the powerful abilities to deal with highly complex tasks, the artificial neural networks (ANNs) have been studied in the hope of achieving human-like performance in many applications  ...  Steganography [4] is referred to the art of embedding secret data into innocent objects such as image, video and audio.  ... 
arXiv:1606.05294v1 fatcat:x6jtrunyybculhni3wm5tijeli
« Previous Showing results 1 — 15 out of 288 results