2001
DOI: 10.1007/3-540-45496-9_21
|View full text |Cite
|
Sign up to set email alerts
|

F5—A Steganographic Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
273
0
5

Year Published

2010
2010
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 884 publications
(278 citation statements)
references
References 3 publications
0
273
0
5
Order By: Relevance
“…Andreas Westfeld based his "F5" algorithm [49] on subtraction and matrix encoding (also known as syndrome coding). F5 embeds only into non-zero AC DCT coefficients by decreasing the absolute value of the coefficient by 1.…”
Section: Fig 17mentioning
confidence: 99%
“…Andreas Westfeld based his "F5" algorithm [49] on subtraction and matrix encoding (also known as syndrome coding). F5 embeds only into non-zero AC DCT coefficients by decreasing the absolute value of the coefficient by 1.…”
Section: Fig 17mentioning
confidence: 99%
“…• Compressed Domain JPEG Image Steganography Embedding (JISE): As an example of a JISE system, we specified the JPEG compressed-domain image steganography scheme called F5 [14]. In this scheme, the secret message is embedded into the non-zero AC coefficients of the whole image using a matrix embedding scheme.…”
Section: Methodsmentioning
confidence: 99%
“…In [14], the matrix embedding scheme used in F5 is based on the (1, n, k) Hamming distance code, where n = 2 k − 1. Hence, to embed every k bits of the message, the embedding scheme changes at most one element in each set of n non-zero AC coefficients.…”
Section: Methodsmentioning
confidence: 99%
“…The voter's ballot is generated every time the chosen candidates are reviewed. During the ballot generation, F5 image steganography algorithm would be applied [29]. The F5 algorithm is implemented to secure data communication between the voter and the election server, even before the ballot is cast.…”
Section: Voting Stagementioning
confidence: 99%