2013 IEEE International Conference on Acoustics, Speech and Signal Processing 2013
DOI: 10.1109/icassp.2013.6638199
|View full text |Cite
|
Sign up to set email alerts
|

Permutation codes and steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
15
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(17 citation statements)
references
References 20 publications
2
15
0
Order By: Relevance
“…Thus, under the knowledge of the legitimacy of x, the ensemble of signals among which the forger can choose a perfect post-processed forgery is the same as the set of Slepian's Variant I permutation codewords with base codeword x [6]. If one replaces "decoy" by "host" and "post-processed forgery" by "watermarked signal", the parallel with perfect steganography is evident (see [5]). …”
Section: Minimum-distortion Perfect Counterforensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, under the knowledge of the legitimacy of x, the ensemble of signals among which the forger can choose a perfect post-processed forgery is the same as the set of Slepian's Variant I permutation codewords with base codeword x [6]. If one replaces "decoy" by "host" and "post-processed forgery" by "watermarked signal", the parallel with perfect steganography is evident (see [5]). …”
Section: Minimum-distortion Perfect Counterforensicsmentioning
confidence: 99%
“…Instead, the steganographer wishes to attach unique labels to all signals in the set, thus maximising the number of messages that can be conveyed (maximum-rate steganography), and also must be able to produce a signal in the set given its label, and vice versa 1 . In a recent paper [5] we showed that Slepian's variant I permutation codes [6] implement maximum-rate perfect steganography if the steganographic detector only examines first-order statistics (or if the host is memoryless). In the light of the discussion above, it follows that Slepian's variant I permutation codes must also be central to implementing minimum-distortion perfect counterforensics when the forensic detector only examines first-order statistics.…”
Section: Introductionmentioning
confidence: 99%
“…Equivalently, the so-called embedding distortion must be bounded in expectation or deterministically, i.e. y − x be easily achieved by partitioning x into subvectors containing values within close vicinity of each other, as described in [1]; partitioning will decrease the embedding distortion but also the embedding rate. However, the rate-distortion tradeoff achieved through partitioning is near optimal [2].…”
Section: A Steganographymentioning
confidence: 99%
“…• In digital steganography the adversary is a warden who intercepts a signal sent between two communicating parties and tries to ascertain whether it carries hidden information or not 1 . This operation is usually called steganalysis.…”
Section: A Optimum Hypothesis Testingmentioning
confidence: 99%
See 1 more Smart Citation