2005
DOI: 10.1007/11552055_12
|View full text |Cite
|
Sign up to set email alerts
|

A Graph–Theoretic Approach to Steganography

Abstract: Abstract. We suggest a graph-theoretic approach to steganography based on the idea of exchanging rather than overwriting pixels. We construct a graph from the cover data and the secret message. Pixels that need to be modified are represented as vertices and possible partners of an exchange are connected by edges. An embedding is constructed by solving the combinatorial problem of calculating a maximum cardinality matching. The secret message is then embedded by exchanging those samples given by the matched edg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
66
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(66 citation statements)
references
References 11 publications
0
66
0
Order By: Relevance
“…This class of meth-ods has been very successful in detecting steganographic methods available today. For example, detection results presented in [10] and also our own experiments indicate that popular JPEG steganographic schemes such as OutGuess [1], StegHide [2], model-based steganography [3], and 1D statistical restoration schemes [6,7] can be successfully detected. Following are the key ingredients that contribute to the success of these blind steganalysis schemes.…”
Section: Resisting Blind Steganalysismentioning
confidence: 80%
See 2 more Smart Citations
“…This class of meth-ods has been very successful in detecting steganographic methods available today. For example, detection results presented in [10] and also our own experiments indicate that popular JPEG steganographic schemes such as OutGuess [1], StegHide [2], model-based steganography [3], and 1D statistical restoration schemes [6,7] can be successfully detected. Following are the key ingredients that contribute to the success of these blind steganalysis schemes.…”
Section: Resisting Blind Steganalysismentioning
confidence: 80%
“…In Table 7, we present a comparison of our steganographic scheme, YASS, to OutGuess [1] and StegHide [2]. To enable fair comparison, we must use the same hiding rate for all the schemes.…”
Section: Comparison With Competing Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…0.2 [23], and Steghide [16]. For F5, MB1, JP Hide&Seek, OutGuess, and Steghide, we embedded messages of three different lengths-100%, 50%, 25% of the maximal image embedding capacity.…”
Section: Multi-classifier For Single-compressed Imagesmentioning
confidence: 99%
“…We also describe the database of test images for training and testing. In Section 4, we construct a seven-class SVM multi-classifier that assigns singlecompressed JPEG images with a wide range of quality factors to either the class of cover images or six JPEG steganographic algorithms (F5 [27], OutGuess [23], Steghide [16], JP Hide&Seek [1], Model based steganography with and without deblocking [24,25,26]). Section 5 is entirely devoted to steganalysis of double-compressed images.…”
Section: Introductionmentioning
confidence: 99%