2021
DOI: 10.1186/s13640-020-00542-2
|View full text |Cite
|
Sign up to set email alerts
|

JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image

Abstract: The excellent cover estimation is very important to the payload location of JPEG image steganography. But it is still hard to exactly estimate the quantized DCT coefficients in cover JPEG image. Therefore, this paper proposes a JPEG image steganography payload location method based on optimal estimation of cover co-frequency sub-image, which estimates the cover JPEG image based on the Markov model of co-frequency sub-image. The proposed method combines the coefficients of the same position in each 8 × 8 block … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…To verify the effectiveness of the proposed location method in this paper, we conduct experiments on the baseline Bossbase 1.01 dataset [47]. It contains 10,000 images in 512 × 512 8 bit grayscale (PGM format) from eight different digital cameras.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…To verify the effectiveness of the proposed location method in this paper, we conduct experiments on the baseline Bossbase 1.01 dataset [47]. It contains 10,000 images in 512 × 512 8 bit grayscale (PGM format) from eight different digital cameras.…”
Section: Resultsmentioning
confidence: 99%
“…Meanwhile, to enhance the accuracy of payload location, the idea of maximum posterior probability was proposed. However, the location performance is not optimal in [40], which can be improved [47]. Without the loss of generality, the linear correlation among the corresponding DCT coefficients in the subimage is not as remarkable as that among the neighboring pixels in the spatial domain.…”
Section: Related Workmentioning
confidence: 98%
“…Also, the following established algorithms obey the rule of binary classification by using hand-crated SPAM features [40] of [41] or deep-learning-based features [42]. Recently, [43,44] propose locating hidden bits in the DCT domain, mainly targeting JSteg and F5 steganography, whose stego key can be recovered in [45].…”
Section: Introductionmentioning
confidence: 99%