Sciweavers

12 search results - page 2 / 3
» Universal Detection of JPEG Steganography
Sort
View
IH
2004
Springer
14 years 4 months ago
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embe...
Jessica J. Fridrich
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
14 years 4 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
ICIP
2008
IEEE
15 years 17 days ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
ECCV
2006
Springer
15 years 22 days ago
Detecting Doctored JPEG Images Via DCT Coefficient Analysis
Abstract. The steady improvement in image/video editing techniques has enabled people to synthesize realistic images/videos conveniently. Some legal issues may occur when a doctore...
Junfeng He, Zhouchen Lin, Lifeng Wang, Xiaoou Tang
ICIP
2004
IEEE
15 years 13 days ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...