DOI: 10.1007/978-3-540-74124-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Batch Steganography and Pooled Steganalysis

Abstract: Abstract. Conventional steganalysis aims to separate cover objects from stego objects, working on each object individually. In this paper we investigate some methods for pooling steganalysis evidence, so as to obtain more reliable detection of steganography in large sets of objects, and the dual problem of hiding information securely when spreading across a batch of covers. The results are rather surprising: in many situations, a steganographer should not spread the embedding across all covers, and the secure … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

4
114
0

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 99 publications
(118 citation statements)
references
References 11 publications
4
114
0
Order By: Relevance
“…The use of small embedding rates provided by batch steganography seems attractive in this sense. Ker in (Ker, 2006) takes the main following assumptions about the batch steganography process:…”
Section: Batch Steganographymentioning
confidence: 99%
See 3 more Smart Citations
“…The use of small embedding rates provided by batch steganography seems attractive in this sense. Ker in (Ker, 2006) takes the main following assumptions about the batch steganography process:…”
Section: Batch Steganographymentioning
confidence: 99%
“…Consequently, the large secret data is hidden in a set of cover images and the resulted set of stego images is passed through the communication channel. This technique is called Batch steganography, which is first proposed by Ker (Ker, 2006). He states in (Ker, 2008) that in batch steganography, the best choice for the steganographer is to spread the secret data equally between cover images.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this paper, we prove this experimental observation and derive a closed form expression for the value of the limit. The performance of a steganographic scheme in the zero-payload limit is important, for example, to avoid detection over multiple uses of the stego channel [9].…”
Section: Motivation and Backgroundmentioning
confidence: 99%