The infinite race between steganography and steganalysis in images
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …
Deep residual network for steganalysis of digital images
M Boroumand, M Chen, J Fridrich - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Steganography detectors built as deep convolutional neural networks have firmly
established themselves as superior to the previous detection paradigm-classifiers based on …
established themselves as superior to the previous detection paradigm-classifiers based on …
Adaptive payload distribution in multiple images steganography based on image texture features
With the coming era of cloud technology, cloud storage is an emerging technology to store
massive digital images, which provides steganography a new fashion to embed secret …
massive digital images, which provides steganography a new fashion to embed secret …
Content-adaptive steganography by minimizing statistical detectability
Most current steganographic schemes embed the secret payload by minimizing a
heuristically defined distortion. Similarly, their security is evaluated empirically using …
heuristically defined distortion. Similarly, their security is evaluated empirically using …
Universal distortion function for steganography in an arbitrary domain
Currently, the most successful approach to steganography in empirical objects, such as
digital media, is to embed the payload while minimizing a suitably defined distortion …
digital media, is to embed the payload while minimizing a suitably defined distortion …
Rich models for steganalysis of digital images
J Fridrich, J Kodovsky - IEEE Transactions on information …, 2012 - ieeexplore.ieee.org
We describe a novel general strategy for building steganography detectors for digital
images. The process starts with assembling a rich model of the noise component as a union …
images. The process starts with assembling a rich model of the noise component as a union …
Designing steganographic distortion using directional filters
V Holub, J Fridrich - … on information forensics and security (WIFS …, 2012 - ieeexplore.ieee.org
This paper presents a new approach to defining additive steganographic distortion in the
spatial domain. The change in the output of directional high-pass filters after changing one …
spatial domain. The change in the output of directional high-pass filters after changing one …
Using statistical image model for JPEG steganography: Uniform embedding revisited
Uniform embedding was first introduced in 2012 for non-side-informed JPEG
steganography, and then extended to the side-informed JPEG steganography in 2014. The …
steganography, and then extended to the side-informed JPEG steganography in 2014. The …
Steganalysis of adaptive JPEG steganography using 2D Gabor filters
X Song, F Liu, C Yang, X Luo, Y Zhang - … of the 3rd ACM workshop on …, 2015 - dl.acm.org
Adaptive JPEG steganographic schemes are difficult to preserve the image texture features
in all scales and orientations when the embedding changes are constrained to the …
in all scales and orientations when the embedding changes are constrained to the …
Digital image steganography using universal distortion
V Holub, J Fridrich - Proceedings of the first ACM workshop on …, 2013 - dl.acm.org
Currently, the most secure practical steganographic schemes for empirical cover sources
embed their payload while minimizing a distortion function designed to capture statistical …
embed their payload while minimizing a distortion function designed to capture statistical …