Sciweavers

17 search results - page 2 / 4
» Detection of Double-Compression in JPEG Images for Applicati...
Sort
View
IH
2004
Springer
13 years 10 months ago
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embe...
Jessica J. Fridrich
ICIP
2008
IEEE
14 years 6 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
13 years 10 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
PCM
2005
Springer
272views Multimedia» more  PCM 2005»
13 years 10 months ago
Fast Adaptive Skin Detection in JPEG Images
Skin region detection plays an important role in a variety of applications such as face detection, adult image filtering and gesture recognition. To improve the accuracy and speed...
Qing-Fang Zheng, Wen Gao
ICMCS
2006
IEEE
143views Multimedia» more  ICMCS 2006»
13 years 11 months ago
On Resampling Detection and its Application to Detect Image Tampering
Usually digital image forgeries are created by copy-pasting a portion of an image onto some other image. While doing so, it is often necessary to resize the pasted portion of the ...
S. Prasad, K. Ramakrishnan