11 Survey of Image Steganography and Steganalysis

M Bachrach, FY Shih - Multimedia Security: Watermarking …, 2012 - api.taylorfrancis.com
The term, steganography, comes from Greek and means “covered writing”(Johnson and
Jajodia, 1998a; Petitcolas et al., 1999). The intent of steganography is to hide a message in …

Data-hiding codes

P Moulin, R Koetter - Proceedings of the IEEE, 2005 - ieeexplore.ieee.org
This tutorial paper reviews the theory and design of codes for hiding or embedding
information in signals such as images, video, audio, graphics, and text. Such codes have …

Exploiting preserved statistics for steganalysis

R Böhme, A Westfeld - International Workshop on Information Hiding, 2004 - Springer
We introduce a steganalytic method which takes advantage of statistics that were preserved
to prevent the chi-square attack. We show that preserving statistics by skip** certain …

[PDF][PDF] Graphical data steganographic protection method based on bits correspondence scheme

Z Hu, I Dychka, Y Sulema… - International Journal of …, 2017 - researchgate.net
The proposed method of graphical data protection is a combined crypto-steganographic
method. It is based on a bit values transformation according to both a certain Boolean …

Provably secure steganography: Achieving zero KL divergence using statistical restoration

K Solanki, K Sullivan, U Madhow… - … on Image Processing, 2006 - ieeexplore.ieee.org
In this paper, we present a framework for the design of steganographic schemes that can
provide provable security by achieving zero Kullback-Leibler divergence between the cover …

Steganalysis of quantization index modulation data hiding

K Sullivan, Z Bi, U Madhow… - … on Image Processing …, 2004 - ieeexplore.ieee.org
Quantization index modulation (QIM) techniques have been gaining popularity in the data
hiding community because of their robustness and information-theoretic optimally against a …

Steganalysis of block-structured stegotext

Y Wang, P Moulin - Security, Steganography, and …, 2004 - spiedigitallibrary.org
We study a detection-theoretic approach to steganalysis. The relative entropy between
covertext and stegotext determines the steganalyzer's difficulty in discriminating them, which …

Nonparametric steganalysis of qim steganography using approximate entropy

H Malik, KP Subbalakshmi… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
This paper proposes an active steganalysis method for quantization index modulation (QIM)-
based steganography. The proposed nonparametric steganalysis method uses irregularity …

Statistical restoration for robust and secure steganography

K Solanki, K Sullivan, U Madhow… - … on Image Processing …, 2005 - ieeexplore.ieee.org
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the
statistics of the composite image to resemble that of the cover. The approach is to reserve a …

A survey of watermarking security

T Furon - International workshop on digital watermarking, 2005 - Springer
Digital watermarking studies have always been driven by the improvement of robustness.
Most of articles of this field deal with this criterion, presenting more and more impressive …