Sciweavers

36 search results - page 1 / 8
» Gibbs Construction in Steganography
Sort
View
TIFS
2010
120views more  TIFS 2010»
13 years 3 months ago
Gibbs Construction in Steganography
Abstract--We make a connection between steganography design by minimizing embedding distortion and statistical physics. The unique aspect of this work and one that distinguishes it...
Tomás Filler, Jessica J. Fridrich
ESORICS
2004
Springer
14 years 1 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
CW
2008
IEEE
14 years 3 months ago
Construction of Autostereograms Taking into Account Object Colors and Its Applications for Steganography
Information on appearances of three-dimensional objects are transmitted via the Internet, and displaying objects plays an important role in a lot of areas such as movies and video...
Yusuke Tsuda, Yonghao Yue, Tomoyuki Nishita
TDHMS
2008
13 years 8 months ago
Constructing Good Covering Codes for Applications in Steganography
Application of covering codes to data embedding improves embedding efficiency and security of steganographic schemes. In this paper, we describe several familes of covering codes c...
Jürgen Bierbrauer, Jessica J. Fridrich
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 8 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin