Filters








149 Hits in 4.5 sec

Upper and Lower Bounds on Black-Box Steganography

Nenad Dedić, Gene Itkis, Leonid Reyzin, Scott Russell
<span title="2008-04-08">2008</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7jmi32x7o5hfnpkgh2irnuqpim" style="color: black;">Journal of Cryptology</a> </i> &nbsp;
On the positive side, we present the first secret-key stegosystem that essentially matches this lower bound regardless of the entropy of the underlying channel.  ...  Furthermore, for high-entropy channels, we present the first secret-key stegosystem that matches this lower bound statelessly (i.e., without requiring synchronized state between sender and receiver).  ...  Scott Russell's work was also facilitated in part by a National Physical Science Consortium Fellowship and by stipend support from the National Security Agency.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-008-9020-3">doi:10.1007/s00145-008-9020-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5m762sy2jrgqpns4pog437srem">fatcat:5m762sy2jrgqpns4pog437srem</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150423115047/http://www.iacr.org/cryptodb/archive/2005/TCC/3634/3634.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a4/46/a4467d3dadbce4b2bffa0057ffe253c2b7a6a86a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00145-008-9020-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Upper and Lower Bounds on Black-Box Steganography [chapter]

Nenad Dedić, Gene Itkis, Leonid Reyzin, Scott Russell
<span title="">2005</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
On the positive side, we present the first secret-key stegosystem that essentially matches this lower bound regardless of the entropy of the underlying channel.  ...  Furthermore, for high-entropy channels, we present the first secret-key stegosystem that matches this lower bound statelessly (i.e., without requiring synchronized state between sender and receiver).  ...  Scott Russell's work was also facilitated in part by a National Physical Science Consortium Fellowship and by stipend support from the National Security Agency.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30576-7_13">doi:10.1007/978-3-540-30576-7_13</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7ctsw2kdxngnfj5vj4ixealp7a">fatcat:7ctsw2kdxngnfj5vj4ixealp7a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150423115047/http://www.iacr.org/cryptodb/archive/2005/TCC/3634/3634.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a4/46/a4467d3dadbce4b2bffa0057ffe253c2b7a6a86a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30576-7_13"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The role of permutation coding in minimum-distortion perfect counterforensics

Felix Balado
<span title="">2014</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rc5jnc4ldvhs3dswicq5wk3vsq" style="color: black;">2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)</a> </i> &nbsp;
This paper exploits the connection between minimum-distortion perfect counterforensics and maximum-rate perfect steganography in order to provide the optimum solution to the first of these problems, in  ...  The solution relies on Slepian's variant I permutation codes, which had previously been shown to implement maximumrate perfect steganography when the host is memoryless (equivalently, when the steganographic  ...  In all likelihood, the same should be possible when the forger can only access the forensic detector as a black-box oracle (see [11] ).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icassp.2014.6854804">doi:10.1109/icassp.2014.6854804</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icassp/Balado14.html">dblp:conf/icassp/Balado14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/q2rfecv2org7lb7p2hcrneuzpu">fatcat:q2rfecv2org7lb7p2hcrneuzpu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813145132/http://mirlab.org/conference_papers/International_Conference/ICASSP%202014/papers/p6281-balado.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/9d/999d240e9e06f655b9af420a8e11033db957f684.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icassp.2014.6854804"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Natural Steganography in JPEG Compressed Images

Tomáš Denemark, Patrick Bas, Jessica Fridrich
<span title="2018-01-28">2018</span> <i title="Society for Imaging Science &amp; Technology"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sajjfb6z3be2xbfjs4d2afwzyi" style="color: black;">IS&amp;T International Symposium on Electronic Imaging Science and Technology</a> </i> &nbsp;
To demonstrate the feasibility and practicality of the proposed method and to validate our simplifying assumptions, we work with two digital cameras, one using a monochrome sensor and a second one equipped  ...  We then explore several versions of the embedding algorithm depending on the model of the added noise in the DCT domain and the possible use of demosaicking to convert the raw image values.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation there on.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2352/issn.2470-1173.2018.07.mwsf-316">doi:10.2352/issn.2470-1173.2018.07.mwsf-316</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cw3dzrk5j5h4pm4iwqmlkbbmoi">fatcat:cw3dzrk5j5h4pm4iwqmlkbbmoi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190303030013/http://pdfs.semanticscholar.org/ae15/6d43a9abd24babd94cfb1c055421b995a559.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ae/15/ae156d43a9abd24babd94cfb1c055421b995a559.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2352/issn.2470-1173.2018.07.mwsf-316"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Artificial Fingerprinting for Generative Models: Rooting Deepfake Attribution in Training Data [article]

Ning Yu, Vladislav Skripniuk, Sahar Abdelnabi, Mario Fritz
<span title="2022-03-17">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
While existing research work on deepfake detection demonstrates high accuracy, it is subject to advances in generation techniques and adversarial iterations on detection countermeasure techniques.  ...  Thus, we seek a proactive and sustainable solution on deepfake detection, that is agnostic to the evolution of generative models, by introducing artificial fingerprints into the models.  ...  We thank David Jacobs, Matthias Zwicker, Abhinav Shrivastava, Yaser Yacoob, and Apratim Bhattacharyya for constructive discussion and advice.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.08457v7">arXiv:2007.08457v7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i3q36p2xg5hcbfuuyk7u6kpfb4">fatcat:i3q36p2xg5hcbfuuyk7u6kpfb4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211009121820/https://arxiv.org/pdf/2007.08457v6.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/f8/b3f81946094cb744969b22c24729d8cef6e2a12e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.08457v7" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Histogram Shifting-Based Quick Response Steganography Method for Secure Communication

Geno Peter, Anli Sherine, Yuvaraja Teekaraman, Ramya Kuppusamy, Arun Radhakrishnan, Shalli Rani
<span title="2022-03-12">2022</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
In this system, the encryption part embeds the secret image using steganography and the decryption part extracts the original image.  ...  Steganography is a tool which allows the data for transmission by concealing secret information in a tremendously growing network.  ...  The algorithms are applied to process the QR codes which include some geometric properties like area, centroid, bounding box for finding and varying the color of "finder patterns," and its conditions for  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2022/1505133">doi:10.1155/2022/1505133</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2esxwpfktzb4ldkus5i2txixle">fatcat:2esxwpfktzb4ldkus5i2txixle</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220521115612/https://downloads.hindawi.com/journals/wcmc/2022/1505133.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/e3/bee35cff598127ab8607594def746da76cc4a764.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2022/1505133"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Distribution-Preserving Steganography Based on Text-to-Speech Generative Models [article]

Kejiang Chen, Hang Zhou, Hanqing Zhao, Dongdong Chen, Weiming Zhang, Nenghai Yu
<span title="2020-11-20">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Take text-to-speech generation task as an example, we propose distribution-preserving steganography based on WaveGlow and WaveNet, which corresponds to the former two categories.  ...  There are two distribution-preserving steganographic frameworks, one is sampling-based and the other is compression-based.  ...  Once the generative model is well-trained and fixed, the generative model can be seen generating data following the same distribution, which meets the requirements of the black-box sampler.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1811.03732v3">arXiv:1811.03732v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sr3t6ysxrza4xhtsln67txc6fm">fatcat:sr3t6ysxrza4xhtsln67txc6fm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201124045342/https://arxiv.org/ftp/arxiv/papers/1811/1811.03732.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/26/af/26af44de25814bfb864ef0d7bfe983318e0445ab.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1811.03732v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

A High Capacity 3D Steganography Algorithm

Min-Wen Chao, Chao-hung Lin, Cheng-Wei Yu, Tong-Yee Lee
<span title="">2009</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hjrujdrg7zaghbdsp5pdzq7cmm" style="color: black;">IEEE Transactions on Visualization and Computer Graphics</a> </i> &nbsp;
In this paper, we present a very high-capacity and low-distortion 3D steganography scheme.  ...  on 3D models.  ...  ACKNOWLEDGMENTS This work is supported in part by the National Science Council (Contracts NSC-95-2221-E-006-193-MY2, NSC-96-2628-E-006-200-MY3, and NSC-96-2221-E-006-312 -MY2), Taiwan, and in part by the  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvcg.2008.94">doi:10.1109/tvcg.2008.94</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/19147891">pmid:19147891</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ohg6daoxdreqrfc2emyed6gcoe">fatcat:ohg6daoxdreqrfc2emyed6gcoe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20131021092203/http://graphics.csie.ncku.edu.tw/Paper_Video/TVCG_Data_Hinding/TVCG_Data_Hinding_accepted_2208_06.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e4/76/e476e4a01f0944a32e13562b9d018cd634a01c4b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tvcg.2008.94"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Extreme learning machine based optimal embedding location finder for image steganography

Hayfaa Abdulzahra Atee, Robiah Ahmad, Norliza Mohd Noor, Abdul Monem S. Rahma, Yazan Aljeroudi, Zhaohong Deng
<span title="2017-02-14">2017</span> <i title="Public Library of Science (PLoS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s3gm7274mfe6fcs7e3jterqlri" style="color: black;">PLoS ONE</a> </i> &nbsp;
Extreme learning machine based optimal embedding location finder for image steganography PLOS ONE | Extreme learning machine based optimal embedding location finder for image steganography PLOS ONE | Fig  ...  Extreme learning machine based optimal embedding location finder for image steganography PLOS ONE | Extreme learning machine based optimal embedding location finder for image steganography PLOS ONE | Extreme  ...  determination of the lower and upper bounds of embedding capacity [34] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1371/journal.pone.0170329">doi:10.1371/journal.pone.0170329</a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pubmed/28196080">pmid:28196080</a> <a target="_blank" rel="external noopener" href="https://pubmed.ncbi.nlm.nih.gov/PMC5308843/">pmcid:PMC5308843</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7y6loyxa7vdtzodtk3jj3stkxa">fatcat:7y6loyxa7vdtzodtk3jj3stkxa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171012071735/http://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0170329&amp;type=printable" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/ff/d4ffa61c45458abd08228f7cde7db4535950eb6f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1371/journal.pone.0170329"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> plos.org </button> </a> <a target="_blank" rel="external noopener" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5308843" title="pubmed link"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> pubmed.gov </button> </a>

On the limits of steganography

R.J. Anderson, F.A.P. Petitcolas
<span title="">1998</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/onirm7ye2bfobnpwuwaopap5yu" style="color: black;">IEEE Journal on Selected Areas in Communications</a> </i> &nbsp;
In this paper, we clarify what steganography is and what it can do.  ...  We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches-many  ...  Once more though, this is an upper bound rather than a safety bound, and is not much help against a powerful opponent.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/49.668971">doi:10.1109/49.668971</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/onmr7g75dbdwdgby6ej2r6usbm">fatcat:onmr7g75dbdwdgby6ej2r6usbm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810181332/http://www.cl.cam.ac.uk/~rja14/Papers/jsac98-limsteg.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/5d/d95d4893a09851d638ea03a95e331890b8d8719c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/49.668971"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Wet paper codes with improved embedding efficiency

Jessica Fridrich, Miroslav Goljan, David Soukal, Edward J. Delp III, Ping Wah Wong
<span title="2006-02-02">2006</span> <i title="SPIE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/aauf57th6zd4diqxn2jsimb7fm" style="color: black;">Security, Steganography, and Watermarking of Multimedia Contents VIII</a> </i> &nbsp;
Practical algorithms are given and their performance is evaluated experimentally and compared to theoretically achievable bounds.  ...  Thus, we have obtained an upper bound on the lower embedding efficiency for a fixed relative message length α. It is possible to show that α H −1 (α) is also an asymptotic upper bound on e.  ...  Obviously, e ≤ e, which is why e is called the lower embedding efficiency. The inequality (5) enables us to derive an upper bound on e and eventually on e.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.640110">doi:10.1117/12.640110</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sswmc/FridrichGS06.html">dblp:conf/sswmc/FridrichGS06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j3swpmpbxffpzkgyveeqqmisty">fatcat:j3swpmpbxffpzkgyveeqqmisty</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830071008/http://www.ws.binghamton.edu/fridrich/Research/wpc_with_improved_embedding_efficiency-ieee.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/2a/d52acc1f3db71f3a610b040d1c5cba4d34876a8d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.640110"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Wet Paper Codes With Improved Embedding Efficiency

J. Fridrich, M. Goljan, D. Soukal
<span title="">2006</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xqa4uhvxwvgsbdpllabnuanz6e" style="color: black;">IEEE Transactions on Information Forensics and Security</a> </i> &nbsp;
Practical algorithms are given and their performance is evaluated experimentally and compared to theoretically achievable bounds.  ...  Thus, we have obtained an upper bound on the lower embedding efficiency for a fixed relative message length α. It is possible to show that α H −1 (α) is also an asymptotic upper bound on e.  ...  Obviously, e ≤ e, which is why e is called the lower embedding efficiency. The inequality (5) enables us to derive an upper bound on e and eventually on e.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2005.863487">doi:10.1109/tifs.2005.863487</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i6nxlwxhybbh3lzvseypy7c6a4">fatcat:i6nxlwxhybbh3lzvseypy7c6a4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830071008/http://www.ws.binghamton.edu/fridrich/Research/wpc_with_improved_embedding_efficiency-ieee.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/2a/d52acc1f3db71f3a610b040d1c5cba4d34876a8d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tifs.2005.863487"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Voicing of animated GIF by data hiding

Sonia Djaziri-Larbi, Awatef Zaien, Sylvie Sevestre-Ghalila
<span title="2015-03-12">2015</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7inqmh346zfjjizjyieh7ijtma" style="color: black;">Multimedia tools and applications</a> </i> &nbsp;
GIF animations are silent image sequences widely used on the web thanks to their wide support and portability.  ...  In this work, we propose an original technique based on data hiding, to add sound tracks in GIF animations.  ...  Acknowledgement The authors would like to thank Rabaa Youssef, CEA-LinkLab, for her very useful advices on HTML5 as well as the Company Telnet Innovation Labs for financial and technology support of this  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11042-015-2491-y">doi:10.1007/s11042-015-2491-y</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zqf6insr4rfe5ahr4be5hje66a">fatcat:zqf6insr4rfe5ahr4be5hje66a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190415002226/https://core.ac.uk/download/pdf/52190726.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c6/4e/c64ea802cacb3370ce59cea1023c0890d57e8e9c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s11042-015-2491-y"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

The UU-Net: Reversible Face De-Identification for Visual Surveillance Video Footage [article]

Hugo Proença
<span title="2020-07-08">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
in a photo-realistic and seamless way; and 2) a private module, designed for legal/security authorities, that analyses the public stream and reconstructs the original scene, disclosing the actual IDs of  ...  Our experiments were conducted in three different visual surveillance datasets (BIODI, MARS and P-DESTRE) and showed highly encouraging results.  ...  ACKNOWLEDGEMENTS This work is funded by FCT/MEC through national funds and co-funded by FEDER -PT2020 partnership agreement under the projects UIDB/EEA/50008/2020, POCI-01-0247-FEDER-033395 and C4: Cloud  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.04316v1">arXiv:2007.04316v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lzjaitgezrd6zfqnlphb35bdty">fatcat:lzjaitgezrd6zfqnlphb35bdty</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200722140637/https://arxiv.org/pdf/2007.04316v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d4/ea/d4ea88f3715ed6bc05a5ebc3e2a93ad43be2c3ee.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2007.04316v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis [article]

Junfeng Guo and Ang Li and Cong Liu
<span title="2022-02-24">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
., on-device deployed DNNs. We address the black-box hard-label backdoor detection problem where the DNN is fully black-box and only its final output label is accessible.  ...  Based on this observation, we propose the adversarial extreme value analysis(AEVA) to detect backdoors in black-box neural networks.  ...  We first derive an upper bound to the backdoor detection objective in Eq. 3 and find its connection to adversarial attack.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.14880v4">arXiv:2110.14880v4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4i35cyiz4bhebfkwk2x66skgni">fatcat:4i35cyiz4bhebfkwk2x66skgni</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220516105920/https://arxiv.org/pdf/2110.14880v4.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/19/2b/192b598c581ba0eabb4bbaa178eb8be6314c3943.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2110.14880v4" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 149 results