2021
DOI: 10.1016/j.sigpro.2021.108015
|View full text |Cite
|
Sign up to set email alerts
|

Invariances of JPEG-quantized DCT coefficients and their application in robust image steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…In least significant bit (LSB) based data hiding, the LSBs of pixel values [1][2][3][4][5] or high-frequency coefficients [6][7] are used as the holder of information bits. In [1][2][3][4][5], it works by replacing the LSBs of randomly selected pixels in the host image with secret message bits.…”
Section: Fig 1 a Simple Model Of Information Hidingmentioning
confidence: 99%
See 1 more Smart Citation
“…In least significant bit (LSB) based data hiding, the LSBs of pixel values [1][2][3][4][5] or high-frequency coefficients [6][7] are used as the holder of information bits. In [1][2][3][4][5], it works by replacing the LSBs of randomly selected pixels in the host image with secret message bits.…”
Section: Fig 1 a Simple Model Of Information Hidingmentioning
confidence: 99%
“…5. From Table 1, we can see that from focus element to four elements (6,7,4,3), the sum of changes in x and y is 2; while from focus element to other four elements (0, 1, 5, 0), the sum of changes in x and y is only 1.…”
Section: Construction Of Informationmentioning
confidence: 99%
“…e penultimate step is valid because of an application of equation (12). e last step is valid since the independence of the steganographic key K, data M, distortion function T, and cover object X.…”
Section: Theoremmentioning
confidence: 99%
“…e adaptive steganography based on STC (Syndrome-Trellis Codes) [8] has a high antidetection performance by embedding data into complex texture areas that are difficult to model and has been a mainstream direction in the field of information hiding in recent years. At present, many STC-based adaptive steganography algorithms [9][10][11][12][13] have been proposed. However, there have been a few studies [14][15][16] that could extract data from STC-based adaptive steganography in specific scenarios, indicating that such algorithms may have hidden security risks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation