2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery 2009
DOI: 10.1109/fskd.2009.230
|View full text |Cite
|
Sign up to set email alerts
|

Steganalysis for Markov Feature of Difference Array in DCT Domain

Abstract: In this paper, an effective steganalysis method based on Markov transition matrix is proposed to attacking the advanced JPEG steganographic schemes. As the horizontal and vertical scan modes failed to detect F5 steganography with low imbedding-rate, zigzag scanning pattern is developed to arrange both DCT (Discrete Cosine Transform) blocks and coefficients in each block. Difference computation was applied on the arranged JPEG 2-D array, which enhanced the variation caused by data embedding. Threshold and trunc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…However with the current techniques for cryptanalysis, we can prove with acceptable accuracy that the cover medium has been exposed to manipulation. By cover medium we mean the data carrier for the hidden messageZhou and Hui [16], Abolghasemi et al [1], Zhi-ping et al [15] .…”
Section: Steganographymentioning
confidence: 99%
See 3 more Smart Citations
“…However with the current techniques for cryptanalysis, we can prove with acceptable accuracy that the cover medium has been exposed to manipulation. By cover medium we mean the data carrier for the hidden messageZhou and Hui [16], Abolghasemi et al [1], Zhi-ping et al [15] .…”
Section: Steganographymentioning
confidence: 99%
“…The steganographic procedure acts as a encapsulation to the hidden data and this encapsulated data is secured by a cryptographic key. Second, we added encryption to steganography by manipulating the hidden data, not the cover medium in the data preparation step this act as a counter measure to steganographic detection [16,1,15] B. Secure steganography…”
Section: A Modern Steganographymentioning
confidence: 99%
See 2 more Smart Citations