2016
DOI: 10.1109/tifs.2015.2486744
|View full text |Cite
|
Sign up to set email alerts
|

Content-Adaptive Steganography by Minimizing Statistical Detectability

Abstract: Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. Similarly, their security is evaluated empirically using classifiers equipped with rich image models. In this paper, we pursue an alternative approach based on a locally-estimated multivariate Gaussian cover image model that is sufficiently simple to derive a closed-form expression for the power of the most powerful detector of content-adaptive LSB matching but, at the same time, complex enough to cap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
314
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 465 publications
(319 citation statements)
references
References 36 publications
4
314
1
Order By: Relevance
“…In the base of MV and MVGG, paper [21] propose the MiPOD (Minimizing the Power of Optimal Detector) algorithm, which is based on a locally-estimated multivariate Gaussian cover image model that is sufficiently simple to derive a closed-form expression for the power of the most powerful detector of content-adaptive LSB matching. At the same time, the proposed model is complex enough to capture the non-stationary character of natural images.…”
Section: Model Driven Methodsmentioning
confidence: 99%
“…In the base of MV and MVGG, paper [21] propose the MiPOD (Minimizing the Power of Optimal Detector) algorithm, which is based on a locally-estimated multivariate Gaussian cover image model that is sufficiently simple to derive a closed-form expression for the power of the most powerful detector of content-adaptive LSB matching. At the same time, the proposed model is complex enough to capture the non-stationary character of natural images.…”
Section: Model Driven Methodsmentioning
confidence: 99%
“…For example, schemes in [6] [7] extract the directional residuals of a cover image through filtering to define the textural region that is hard to model. Scheme in [8] [9] uses the multivariate Gaussian cover model to minimize the embedding distortion on statistics. What's more, thanks to the research of Syndrome-Trellis Codes (STC) [10], researchers no longer need to pay attention on the site of embedding, but only consider how to choose more appropriate distortion function.…”
Section: Journal Of Computer and Communicationsmentioning
confidence: 99%
“…However, the researchers only have to choose one of these three protocols. These protocols are secret key steganography, pure steganography, and public key steganography as stated in [20,21,22]. …”
Section: Steganography Protocolsmentioning
confidence: 99%