Sciweavers

2474 search results - page 6 / 495
» Attacks on Steganographic Systems
Sort
View
TDP
2008
60views more  TDP 2008»
14 years 9 months ago
On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems
We consider the unbounded integer grid and the digitized version of the straight line y = x + , with , R being the set of points (i, [i + ]), i Z, where [
Maria Bras-Amorós, Josep Domingo-Ferrer
ICIP
2005
IEEE
15 years 11 months ago
An adaptive DCT-based Mod-4 steganographic method
This paper presents a novel Mod-4 steganographic method in discrete cosine transform (DCT) domain. A group of 2?2 quantized DCT coefficients (GQC) is selected as the valid embeddi...
Xiaojun Qi, KokSheik Wong
59
Voted
IH
2004
Springer
15 years 2 months ago
Exploiting Preserved Statistics for Steganalysis
We introduce a steganalytic method which takes advantage of statistics that were preserved to prevent the chi-square attack. We show that preserving statistics by skipping certain ...
Rainer Böhme, Andreas Westfeld
CSSE
2008
IEEE
15 years 4 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
TIFS
2010
120views more  TIFS 2010»
14 years 4 months ago
Quantitative Structural Steganalysis of Jsteg
Quantitative steganalysis strives to estimate the change rate defined as the relative number of embedding changes introduced by steganography. In this paper, we propose two new cla...
Jan Kodovský, Jessica J. Fridrich