The infinite race between steganography and steganalysis in images

T Muralidharan, A Cohen, A Cohen, N Nissim - Signal Processing, 2022 - Elsevier
Steganography is the primary method by which individuals can communicate covertly;
cryptography, on the other hand, fails at this, as it is possible to detect (the presence of) …

Deep residual network for steganalysis of digital images

M Boroumand, M Chen, J Fridrich - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Steganography detectors built as deep convolutional neural networks have firmly
established themselves as superior to the previous detection paradigm-classifiers based on …

Adaptive payload distribution in multiple images steganography based on image texture features

X Liao, J Yin, M Chen, Z Qin - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the coming era of cloud technology, cloud storage is an emerging technology to store
massive digital images, which provides steganography a new fashion to embed secret …

Content-adaptive steganography by minimizing statistical detectability

V Sedighi, R Cogranne, J Fridrich - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Most current steganographic schemes embed the secret payload by minimizing a
heuristically defined distortion. Similarly, their security is evaluated empirically using …

Universal distortion function for steganography in an arbitrary domain

V Holub, J Fridrich, T Denemark - EURASIP Journal on Information …, 2014 - Springer
Currently, the most successful approach to steganography in empirical objects, such as
digital media, is to embed the payload while minimizing a suitably defined distortion …

Rich models for steganalysis of digital images

J Fridrich, J Kodovsky - IEEE Transactions on information …, 2012 - ieeexplore.ieee.org
We describe a novel general strategy for building steganography detectors for digital
images. The process starts with assembling a rich model of the noise component as a union …

Designing steganographic distortion using directional filters

V Holub, J Fridrich - … on information forensics and security (WIFS …, 2012 - ieeexplore.ieee.org
This paper presents a new approach to defining additive steganographic distortion in the
spatial domain. The change in the output of directional high-pass filters after changing one …

Using statistical image model for JPEG steganography: Uniform embedding revisited

L Guo, J Ni, W Su, C Tang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Uniform embedding was first introduced in 2012 for non-side-informed JPEG
steganography, and then extended to the side-informed JPEG steganography in 2014. The …

Steganalysis of adaptive JPEG steganography using 2D Gabor filters

X Song, F Liu, C Yang, X Luo, Y Zhang - … of the 3rd ACM workshop on …, 2015 - dl.acm.org
Adaptive JPEG steganographic schemes are difficult to preserve the image texture features
in all scales and orientations when the embedding changes are constrained to the …

Digital image steganography using universal distortion

V Holub, J Fridrich - Proceedings of the first ACM workshop on …, 2013 - dl.acm.org
Currently, the most secure practical steganographic schemes for empirical cover sources
embed their payload while minimizing a distortion function designed to capture statistical …