Sciweavers

48 search results - page 4 / 10
» Image based steganography and cryptography
Sort
View
ICIP
2008
IEEE
14 years 2 months ago
Detection of +/-1 LSB steganography based on the amplitude of histogram local extrema
Recently Zhang et al described an algorithm for the detection of ±1 LSB steganography based on the statistics of the amplitudes of local extrema in the greylevel histogram. Exper...
Giacomo Cancelli, Gwenaël J. Doërr, Inge...
ICIP
2005
IEEE
14 years 9 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
ICIAR
2005
Springer
14 years 1 months ago
A Step Towards Practical Steganography Systems
There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide se...
Abdelkader H. Ouda, Mahmoud R. El-Sakka
MMSEC
2004
ACM
145views Multimedia» more  MMSEC 2004»
14 years 1 months ago
Improving LSB steganalysis using marginal and joint probabilistic distributions
The goal of steganalysis is to search for the presence of hidden information in numerical contents. This paper is based on a previous LSB steganalysis scheme for digital images th...
Benoit Roue, Patrick Bas, Jean-Marc Chassery
IH
2007
Springer
14 years 1 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath