Sciweavers

8 search results - page 1 / 2
» JPEG Steganography: A Performance Evaluation of Quantization...
Sort
View
AINA
2009
IEEE
13 years 11 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
TIFS
2010
132views more  TIFS 2010»
13 years 3 months ago
JPEG error analysis and its applications to digital image forensics
JPEG is one of the most extensively used image formats. Understanding the inherent characteristics of JPEG may play a useful role in digital image forensics. In this paper, we int...
Weiqi Luo, Jiwu Huang, Guoping Qiu
JEI
2006
128views more  JEI 2006»
13 years 4 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
ICIP
2003
IEEE
14 years 6 months ago
JPEG compression history estimation for color images
Given a color image previously compressed using JPEG, we estimate the image's JPEG compression history components including the color transformation, subsampling, and the qua...
Ramesh Neelamani, Ricardo L. de Queiroz, Zhigang F...
ICIP
2004
IEEE
14 years 6 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...