Sciweavers

13 search results - page 3 / 3
» Blind Steganalysis of Mp3stego
Sort
View
TIFS
2010
171views more  TIFS 2010»
14 years 4 months ago
A method for automatic identification of signatures of steganography software
Abstract--A fully automated, blind, media-type agnostic approach to steganalysis is presented here. Steganography may sometimes be exposed by detecting automatically characterized ...
Graeme Bell, Yeuan-Kuen Lee
IPCV
2007
14 years 10 months ago
QIM-Based Histogram-Preserving and High Capacity Steganography for JPEG Images
- We propose a secure steganographic approach with a high capacity. We first use small neighborhoods of the original histogram to calculate the minimum remapping from a histogram t...
Xiaojun Qi, Daniel Lewis
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 2 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal