Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security 2013
DOI: 10.1145/2482513.2482965
|View full text |Cite
|
Sign up to set email alerts
|

Moving steganography and steganalysis from the laboratory into the real world

Abstract: There has been an explosion of academic literature on steganography and steganalysis in the past two decades. With a few exceptions, such papers address abstractions of the hiding and detection problems, which arguably have become disconnected from the real world. Most published results, including by the authors of this paper, apply "in laboratory conditions" and some are heavily hedged by assumptions and caveats; significant challenges remain unsolved in order to implement good steganography and steganalysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
123
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 216 publications
(124 citation statements)
references
References 94 publications
1
123
0
Order By: Relevance
“…We agree with the importance given to "Open Problem 1" in [7], namely the design of effective coding schemes for nonadditive distortion function.…”
Section: Discussionsupporting
confidence: 83%
“…We agree with the importance given to "Open Problem 1" in [7], namely the design of effective coding schemes for nonadditive distortion function.…”
Section: Discussionsupporting
confidence: 83%
“…Over the last ten years, most of the steganalysis methods are dealing with grayscale images [14], there exist very few steganalysis methods dealing with color images. The most recent methods in color image steganalysis are explained in detail in the three following subsections.…”
Section: Color Steganalysis Methodsmentioning
confidence: 99%
“…This can be explained by the fact that all features in the CC-JRM are referencing each other and thus both CC-JRM and CC-JRM-pairs cases are quantitatively similar. .4446 ± .0145 CD-JRM (11,255) .2083 ± .0035 .3462 ± .0055 .2776 ± .0058 .2091 ± .0023 .2118 ± .0061 Table 7. Detection error for three versions of the JRM: CC-JRM, CC-JRM with random subspaces selected in pairs feature-reference (CC-JRM-pairs), and the difference calibrated JRM (CD-JRM).…”
Section: Experiments With the Cc-jrm Feature Vectormentioning
confidence: 99%
“…Given the great diversity and the associated complexity of the problem, it is not surprising that, at present, the problem of the CSM is rather poorly understood. It has also been identified as one of the main obstacles when deploying steganalysis in real world [11].…”
Section: Introductionmentioning
confidence: 99%