Sciweavers

17 search results - page 1 / 4
» Detection of Double-Compression in JPEG Images for Applicati...
Sort
View
TIFS
2008
194views more  TIFS 2008»
13 years 4 months ago
Detection of Double-Compression in JPEG Images for Applications in Steganography
This paper presents a method for detection of double JPEG compression and a maximum likelihood estimator of the primary quality factor. These methods are essential for construction...
Tomás Pevný, Jessica J. Fridrich
ESORICS
2004
Springer
13 years 10 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
TIFS
2010
132views more  TIFS 2010»
13 years 2 months ago
JPEG error analysis and its applications to digital image forensics
JPEG is one of the most extensively used image formats. Understanding the inherent characteristics of JPEG may play a useful role in digital image forensics. In this paper, we int...
Weiqi Luo, Jiwu Huang, Guoping Qiu
IH
2007
Springer
13 years 10 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
ICIP
2004
IEEE
14 years 6 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...