Sciweavers

2474 search results - page 2 / 495
» Attacks on Steganographic Systems
Sort
View
CSREASAM
2006
13 years 6 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
13 years 10 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
ICIP
2008
IEEE
14 years 6 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
IH
1998
Springer
13 years 9 months ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf
ISCAS
2007
IEEE
143views Hardware» more  ISCAS 2007»
13 years 11 months ago
Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study
—In the implementation of a few JPEG steganographic schemes such as OutGuess and F5, an additional JPEG compression may take place before data embedding. The effect of this recom...
Yun Q. Shi, Chunhua Chen, Wen Chen, Maala P. Kaund...