A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Adaptive Steganography in the Noisy Channel with Dual-Syndrome Trellis Codes
2018
2018 IEEE International Workshop on Information Forensics and Security (WIFS)
Adaptive steganography aims to reduce distortion in the embedding process, typically using Syndrome Trellis Codes (STCs). ...
We also propose an extension called Dual-Syndrome Trellis Codes, that combines error correction and embedding in the same Viterbi process, which slightly outperforms a straightforward combination of standard ...
Dual-Syndrome Trellis Codes We propose to develop STCs into Dual-Syndrome Trellis Codes, that solve for two syndromes simultaneously. ...
doi:10.1109/wifs.2018.8630779
dblp:conf/wifs/Kin-CleavesK18
fatcat:iyzrh47uizbenijc7cpwiekwoa
Steganography using Gibbs random fields
2010
Proceedings of the 12th ACM workshop on Multimedia and security - MM&Sec '10
The Gibbs sampler is the key tool for simulating the impact of optimal embedding and for constructing practical embedding algorithms. ...
The proposed framework reduces the design of secure steganography in empirical covers to the problem of finding suitable local potentials for the distortion function that correlate with statistical detectability ...
Fortunately, the syndrome-trellis codes can generously accept various portions of wet pixels without any performance penalty [7] . ...
doi:10.1145/1854229.1854266
dblp:conf/mmsec/FillerF10
fatcat:4iy4xvfrpncydjtbwwq27c2vfe
Gibbs Construction in Steganography
2010
IEEE Transactions on Information Forensics and Security
We provide a complete theoretical framework and describe practical tools, such as the thermodynamic integration for computing the rate-distortion bound and the Gibbs sampler for simulating the impact of ...
The proposed framework reduces the design of secure steganography in empirical covers to the problem of finding local potentials for the distortion function that correlate with statistical detectability ...
The only practical near-optimal embedding algorithm for this case known to the authors is based on syndrome-trellis codes [7] . ...
doi:10.1109/tifs.2010.2077629
fatcat:7hmxpf5cjvhkzfclob3fnyz6fm
Distribution-Preserving Steganography Based on Text-to-Speech Generative Models
[article]
2020
arXiv
pre-print
Fortunately, generative models bring new vitality to distribution-preserving steganography, which can serve as the perfect sampler or provide the explicit distribution of generative media. ...
The former requires a perfect sampler which yields data following the same distribution, and the latter needs explicit distribution of generative objects. ...
distortion codes, such as syndrome trellis codes (STCs) [43] . ...
arXiv:1811.03732v3
fatcat:sr3t6ysxrza4xhtsln67txc6fm
Generative Steganography by Sampling
2019
IEEE Access
Both parties share a secret key used for message embedding and extraction. The Jensen-Shannon divergence is introduced as a new criterion for evaluating the security of generative steganography. ...
Next, for the trained generator, backpropagation to the message and prior loss are introduced to optimize the coding of the input noise data for the generator. ...
through syndrome trellis coding (STC) [4] . ...
doi:10.1109/access.2019.2920313
fatcat:if2cerivxrho3gwoyfy6zvwlga
Search for Image Steganographic Policy with Adversary and Auxiliary Constrained Distance Measure
2022
IEEE Access
steganography to defeat the steganalyser. ...
Ultimately, within the searched steganographic policy, the stego objects could be generated by the STC coder. ...
practical steganographic coding scheme, e.g., Syndrome-Trellis codes(STC) [42] . ...
doi:10.1109/access.2022.3164666
fatcat:rtvlge6ivnbfphn5leush535d4
Generative Steganography by Sampling
[article]
2019
arXiv
pre-print
Both parties share a secret key used for message embedding and extraction. The Jensen-Shannon divergence is introduced as a new criterion for evaluating the security of generative steganography. ...
Next, for the trained generator, backpropagation to the message and prior loss are introduced to optimize the coding of the input noise data for the generator. ...
cover and stego with Syndrome Trellis Coding (STC). ...
arXiv:1804.10531v2
fatcat:ftnagewz3jgdxk5z5hvzuzreh4
Moving steganography and steganalysis from the laboratory into the real world
2013
Proceedings of the first ACM workshop on Information hiding and multimedia security - IH&MMSec '13
This position paper sets out some of the important questions which have been left unanswered, as well as highlighting some that have already been addressed successfully, for steganography and steganalysis ...
There has been an explosion of academic literature on steganography and steganalysis in the past two decades. ...
Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. ...
doi:10.1145/2482513.2482965
dblp:conf/ih/KerBBCCFFP13
fatcat:pdf3gedtzre6vg33kkeu6nm3oq
Improving Steganographic Security by Synchronizing the Selection Channel
2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '15
This paper describes a general method for increasing the security of additive steganographic schemes for digital images represented in the spatial domain. ...
Since the distortion function is purposely designed as a sum of locally supported potentials, one can use the Gibbs construction to realize the embedding in practice. ...
First, a binary Syndrome-Trellis Code [3] (STC) was used to determine which least significant bits were to be changed. ...
doi:10.1145/2756601.2756620
dblp:conf/ih/DenemarkF15
fatcat:q6bkt4e7qjahviboaafxguc5fe