Filters








9 Hits in 2.7 sec

Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes

Christy Kin-Cleaves, Andrew D. Ker
2018 2018 IEEE International Workshop on Information Forensics and Security (WIFS)  
Adaptive steganography aims to reduce distortion in the embedding process, typically using Syndrome Trellis Codes (STCs).  ...  We also propose an extension called Dual-Syndrome Trellis Codes, that combines error correction and embedding in the same Viterbi process, which slightly outperforms a straightforward combination of standard  ...  Dual-Syndrome Trellis Codes We propose to develop STCs into Dual-Syndrome Trellis Codes, that solve for two syndromes simultaneously.  ... 
doi:10.1109/wifs.2018.8630779 dblp:conf/wifs/Kin-CleavesK18 fatcat:iyzrh47uizbenijc7cpwiekwoa

Steganography using Gibbs random fields

Tomáš Filler, Jessica Fridrich
2010 Proceedings of the 12th ACM workshop on Multimedia and security - MM&Sec '10  
The Gibbs sampler is the key tool for simulating the impact of optimal embedding and for constructing practical embedding algorithms.  ...  The proposed framework reduces the design of secure steganography in empirical covers to the problem of finding suitable local potentials for the distortion function that correlate with statistical detectability  ...  Fortunately, the syndrome-trellis codes can generously accept various portions of wet pixels without any performance penalty [7] .  ... 
doi:10.1145/1854229.1854266 dblp:conf/mmsec/FillerF10 fatcat:4iy4xvfrpncydjtbwwq27c2vfe

Gibbs Construction in Steganography

Tom Filler, Jessica Fridrich
2010 IEEE Transactions on Information Forensics and Security  
We provide a complete theoretical framework and describe practical tools, such as the thermodynamic integration for computing the rate-distortion bound and the Gibbs sampler for simulating the impact of  ...  The proposed framework reduces the design of secure steganography in empirical covers to the problem of finding local potentials for the distortion function that correlate with statistical detectability  ...  The only practical near-optimal embedding algorithm for this case known to the authors is based on syndrome-trellis codes [7] .  ... 
doi:10.1109/tifs.2010.2077629 fatcat:7hmxpf5cjvhkzfclob3fnyz6fm

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models [article]

Kejiang Chen, Hang Zhou, Hanqing Zhao, Dongdong Chen, Weiming Zhang, Nenghai Yu
2020 arXiv   pre-print
Fortunately, generative models bring new vitality to distribution-preserving steganography, which can serve as the perfect sampler or provide the explicit distribution of generative media.  ...  The former requires a perfect sampler which yields data following the same distribution, and the latter needs explicit distribution of generative objects.  ...  distortion codes, such as syndrome trellis codes (STCs) [43] .  ... 
arXiv:1811.03732v3 fatcat:sr3t6ysxrza4xhtsln67txc6fm

Generative Steganography by Sampling

Zhuo Zhang, Jia Liu, Yan ke, Yu Lei, Jun Li, Minqing Zhang, Xiaoyuan Yang
2019 IEEE Access  
Both parties share a secret key used for message embedding and extraction. The Jensen-Shannon divergence is introduced as a new criterion for evaluating the security of generative steganography.  ...  Next, for the trained generator, backpropagation to the message and prior loss are introduced to optimize the coding of the input noise data for the generator.  ...  through syndrome trellis coding (STC) [4] .  ... 
doi:10.1109/access.2019.2920313 fatcat:if2cerivxrho3gwoyfy6zvwlga

Search for Image Steganographic Policy with Adversary and Auxiliary Constrained Distance Measure

Lin Li, Mingyu Fan, Mingwei Tang
2022 IEEE Access  
steganography to defeat the steganalyser.  ...  Ultimately, within the searched steganographic policy, the stego objects could be generated by the STC coder.  ...  practical steganographic coding scheme, e.g., Syndrome-Trellis codes(STC) [42] .  ... 
doi:10.1109/access.2022.3164666 fatcat:rtvlge6ivnbfphn5leush535d4

Generative Steganography by Sampling [article]

Zhuo Zhang, Jia Liu, Yan Ke, Yu Lei, Jun Li, Minqing Zhang and Xiaoyuan Yang
2019 arXiv   pre-print
Both parties share a secret key used for message embedding and extraction. The Jensen-Shannon divergence is introduced as a new criterion for evaluating the security of generative steganography.  ...  Next, for the trained generator, backpropagation to the message and prior loss are introduced to optimize the coding of the input noise data for the generator.  ...  cover and stego with Syndrome Trellis Coding (STC).  ... 
arXiv:1804.10531v2 fatcat:ftnagewz3jgdxk5z5hvzuzreh4

Moving steganography and steganalysis from the laboratory into the real world

Andrew D. Ker, Patrick Bas, Rainer Böhme, Rémi Cogranne, Scott Craver, Tomáš Filler, Jessica Fridrich, Tomáš Pevný
2013 Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13  
This position paper sets out some of the important questions which have been left unanswered, as well as highlighting some that have already been addressed successfully, for steganography and steganalysis  ...  There has been an explosion of academic literature on steganography and steganalysis in the past two decades.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1145/2482513.2482965 dblp:conf/ih/KerBBCCFFP13 fatcat:pdf3gedtzre6vg33kkeu6nm3oq

Improving Steganographic Security by Synchronizing the Selection Channel

Tomáš Denemark, Jessica Fridrich
2015 Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '15  
This paper describes a general method for increasing the security of additive steganographic schemes for digital images represented in the spatial domain.  ...  Since the distortion function is purposely designed as a sum of locally supported potentials, one can use the Gibbs construction to realize the embedding in practice.  ...  First, a binary Syndrome-Trellis Code [3] (STC) was used to determine which least significant bits were to be changed.  ... 
doi:10.1145/2756601.2756620 dblp:conf/ih/DenemarkF15 fatcat:q6bkt4e7qjahviboaafxguc5fe