2010 Eighth International Conference on Privacy, Security and Trust 2010
DOI: 10.1109/pst.2010.5593230
|View full text |Cite
|
Sign up to set email alerts
|

J3: High payload histogram neutral JPEG steganography

Abstract: Steganography is the art of secret communication between two parties that not only conceals the contents of a message but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has some weakness that has allowed its effects to be detected, usually through statistical analysis of the image. In this paper, we propose a different approach to JPEG steganography that provides high embedding ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…Notwithstanding the three key ideas of security, two other security objectives are basic with respect to cryptography: confirmation and non-revocation [10]. 1.…”
Section: Information Security and Steganographymentioning
confidence: 99%
See 2 more Smart Citations
“…Notwithstanding the three key ideas of security, two other security objectives are basic with respect to cryptography: confirmation and non-revocation [10]. 1.…”
Section: Information Security and Steganographymentioning
confidence: 99%
“…No Detection: Steganography fizzles in the event that somebody can without much of a stretch distinguish where you conceal your data and discover your message. In this way, regardless of whether somebody knows how the steganography strategy installs the mystery data, he or she can't without much of a stretch discover that you have implanted information in a given record [10]. 4.…”
Section: Information Security and Steganographymentioning
confidence: 99%
See 1 more Smart Citation
“…, n, where b i ∈ {0, 1} is the message bit embedded in the i-th element of the host. The histogram-preserving methods in [11], [12] and [13] can be seen as using LSB steganography plus some kind of histogram compensation to remediate the lack of histogram preservation in the baseline technique. These beginnings limit their possibilities.…”
Section: Prior Work and Problem Historymentioning
confidence: 99%
“…Using (41) and (42), the figures of merit for the embedding distortion (13) and (14) can be put as a function of ω(x) (1/n)ω(x) = p 2 as follows:…”
Section: E Binary Hostmentioning
confidence: 99%