2018
DOI: 10.1007/s11432-017-9328-2
|View full text |Cite
|
Sign up to set email alerts
|

Extracting hidden messages of MLSB steganography based on optimal stego subset

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
10

Relationship

3
7

Authors

Journals

citations
Cited by 42 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…In the future, we will expand to more process scenarios, and we will deploy more devices and protocols such as robotic control systems and other processes of the power grid. Additionally, we will introduce the steganography technology [Zhang, Qin, Zhang et al (2018)] to conceal attacks, and add steganalysis [Yang, Luo, Lu et al (2018); Ma, Luo, Li et al (2018)] and machine learning [Xiang, Zhao, Li et al (2018)] technology in order to evaluate the security.…”
Section: Resultsmentioning
confidence: 99%
“…From the security analysis and experimental results, the proposed scheme is proven to possess anonymity, traceability and authentication functionalities. In the future, it should be an interesting issue to transmit the signature by steganography [Zhang, Qin, Zhang et al (2018)] because of its excellent imperceptible in human sense system and statistic [Yang, Luo, Lu et al (2018)].…”
Section: Discussionmentioning
confidence: 99%