Sciweavers

28 search results - page 5 / 6
» F5-A Steganographic Algorithm
Sort
View
ICASSP
2010
IEEE
13 years 5 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 26 days ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
ICMCS
2007
IEEE
125views Multimedia» more  ICMCS 2007»
14 years 1 months ago
JPEG Based Conditional Entropy Coding for Correlated Steganography
Correlated steganography considers the case in which the cover Work is chosen to be correlated with the covert message that is to be hidden. The advantage of this is that, at leas...
Lei Zheng, Ingemar J. Cox
IWDW
2005
Springer
14 years 29 days ago
Towards Multi-class Blind Steganalyzer for JPEG Images
In this paper, we use the previously proposed calibrated DCT features [9] to construct a Support Vector Machine classifier for JPEG images capable of recognizing which steganograp...
Tomás Pevný, Jessica J. Fridrich
WPES
2006
ACM
14 years 1 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...