11 Survey of Image Steganography and Steganalysis
M Bachrach, FY Shih - Multimedia Security: Watermarking …, 2012 - api.taylorfrancis.com
The term, steganography, comes from Greek and means “covered writing”(Johnson and
Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …
Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …
Data-hiding codes
P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …
information in signals such as images, video, audio, graphics, and text. Such codes have …
Exploiting preserved statistics for steganalysis
We introduce a steganalytic method which takes advantage of statistics that were preserved
to prevent the chi-square attack. We show that preserving statistics by skip** certain …
to prevent the chi-square attack. We show that preserving statistics by skip** certain …
[PDF][PDF] Graphical data steganographic protection method based on bits correspondence scheme
The proposed method of graphical data protection is a combined crypto-steganographic
method. It is based on a bit values transformation according to both a certain Boolean …
method. It is based on a bit values transformation according to both a certain Boolean …
Provably secure steganography: Achieving zero KL divergence using statistical restoration
In this paper, we present a framework for the design of steganographic schemes that can
provide provable security by achieving zero Kullback-Leibler divergence between the cover …
provide provable security by achieving zero Kullback-Leibler divergence between the cover …
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data
hiding community because of their robustness and information-theoretic optimally against a …
hiding community because of their robustness and information-theoretic optimally against a …
Steganalysis of block-structured stegotext
Y Wang, P Moulin - Security, Steganography, and …, 2004 - spiedigitallibrary.org
We study a detection-theoretic approach to steganalysis. The relative entropy between
covertext and stegotext determines the steganalyzer's difficulty in discriminating them, which …
covertext and stegotext determines the steganalyzer's difficulty in discriminating them, which …
Nonparametric steganalysis of qim steganography using approximate entropy
This paper proposes an active steganalysis method for quantization index modulation (QIM)-
based steganography. The proposed nonparametric steganalysis method uses irregularity …
based steganography. The proposed nonparametric steganalysis method uses irregularity …
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the
statistics of the composite image to resemble that of the cover. The approach is to reserve a …
statistics of the composite image to resemble that of the cover. The approach is to reserve a …
A survey of watermarking security
T Furon - International workshop on digital watermarking, 2005 - Springer
Digital watermarking studies have always been driven by the improvement of robustness.
Most of articles of this field deal with this criterion, presenting more and more impressive …
Most of articles of this field deal with this criterion, presenting more and more impressive …