2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.53
|View full text |Cite
|
Sign up to set email alerts
|

A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(32 citation statements)
references
References 7 publications
0
32
0
Order By: Relevance
“…Utiliz-ing the appropriately defined distortion functions and minimizing embedding cost codes --STCs (Syndrome-Trellis Codes) [4], these algorithms can adaptively select embedding locations according to the content of cover images, thus realizing message embedding with a good detection resistance against steganalysis based on statistical features [8]. However, these algorithms usually do not consider the situation when the stego images are attacked during the transmission through public lossy channels exposed to image processing attacks, resulting in the embedded messages hard to survive after these attacks and the failure of covert communication under lossy channels [20].…”
Section: Introductionmentioning
confidence: 99%
“…Utiliz-ing the appropriately defined distortion functions and minimizing embedding cost codes --STCs (Syndrome-Trellis Codes) [4], these algorithms can adaptively select embedding locations according to the content of cover images, thus realizing message embedding with a good detection resistance against steganalysis based on statistical features [8]. However, these algorithms usually do not consider the situation when the stego images are attacked during the transmission through public lossy channels exposed to image processing attacks, resulting in the embedded messages hard to survive after these attacks and the failure of covert communication under lossy channels [20].…”
Section: Introductionmentioning
confidence: 99%
“…The methods in [7,10,23] are based on DCT transformations. These techniques utilize DCT coefficients' relationships and STCs.…”
Section: A Jpeg Steganography -Frequency Domainmentioning
confidence: 99%
“…Some JPEG Steganography methods that modify the DCT coefficients to embed the secret data are [5,7,13]. Zhang et al [5] proposed JPEG Steganography method based on 'STCs' (Syndrome Trellis Coding) and distortion function is used to calculate distortion of DCT coefficient to reduce noise.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [5] proposed JPEG Steganography method based on 'STCs' (Syndrome Trellis Coding) and distortion function is used to calculate distortion of DCT coefficient to reduce noise. Wang et al [7] presented JPEG Steganography based on the block entropy of DCT coefficients and STCs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation