![]() Li X, Zhang T, Zhang Y, Li W, Li K (2012) A novel blind detector for additive noise steganography in JPEG decompressed images. Li B, He J, Huang J, Shi YQ (2011) A survey on image steganography and steganalysis. In: Proceedings of 5th IEEE international conference on image processing (ICIP), vol 2, pp 226–230 Kim JR, Moon YS (1999) A robust wavelet-based digital watermarking using level-adaptive thresholding. An edited version of this paper with the title ‘’hiding data in data” appeared in April 2002 issue of windows & NET magazine. Kessler G (2012) Steganography: Hiding data within data. In: Information hiding, 1st international workshop, lecture notes in computer science, pp 1–5 Kahn D (1996) The history of steganography. Johnson NF, Duric Z, Jajodia S, Memon N (2001) Information hiding: steganography and watermarking-attacks and countermeasures. In: Information hiding, 2nd international workshop, lecture notes in computer science, pp 273–289 Johnson N, Jajodia S (1998) Steganalysis of images created using current steganography software. Huang HC, Wang FH, Pan JS (2001) Efficient and robust watermarking algorithm with vector quantisation. Hénon M (1976) A two-dimensional mapping with a strange attractor. Hamming R (1950) Error detecting and error correcting codes. In: Information hiding, 13th international conference, lecture notes in computer science, pp 102–117 67–81 (2005)įridrich J, Kodovskỳ J, Goljan M, Holub V (2011) Steganalysis of content-adaptive steganography in spatial domain. In: Information hiding, 7th international workshop, lecture notes in computer science, pp. In: Proceedings of ACM multimedia security workshop, vol 20, pp 4–15įridrich J (2005) Feature-based steganalysis for JPEG images and its implications for future design of steganographic schemes. Signal Process 90(3):727–752įridrich J, Goljan M, Soukal D (2004) Perturbed quantization steganography with wet paper codes. In: Proceedings of IEEE international conference on image processing (ICIP), vol 3, pp 1019–1022Ĭheddad A, Condell J, Curran K, Mc Kevitt P (2010) Digital image steganography: survey and analysis of current methods. In: Proceedings of SPIE, vol 6247, pp 1–9Ĭhandramouli R, Memon N (2001) Analysis of LSB based image steganography techniques. Inf control 3(1):68–79Ĭao H, Xiang H, Li X, Liu M, Yi S, Wei F (2006) A zero-watermarking algorithm based on DWT and chaotic modulation. Signal process 66(3):357–372īose R, Ray-Chaudhuri D (1960) On a class of error correcting binary group codes. IEEE J Sel Areas Commun 16(4):474–481īarni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-domain system for robust image watermarking. In: Proceedings of 16th IEEE international conference on image processing (ICIP), pp 3637–3640Īnderson R, Petitcolas F (1998) On the limits of steganography. The proposed algorithm is also analyzed for security and is found to be secure, in highly compromised scenarios, where all except one of the key components required to retrieve payload are known to the adversary.Ībdul W, Carré P, Gaborit P (2009) List decoding of Reed Solomon codes for wavelet based colour image watermarking scheme. Imperceptibility analysis reveals that the proposed algorithm is totally imperceptible regardless of the payload length. ![]() ![]() Survivability of the proposed algorithm is analyzed against JPEG compression, noise and low-pass filtering attacks. Moreover, use of chaotic map in the process of data hiding provides improved security. The proposed algorithm hides the payload based on certain relationship between the cover image, chaotic sequence and the payload, instead of directly embedding payload into the cover image which often leaves tell tale signs of steganography. Zero-steg-anography is an imperceptible and undetectable data hiding technique as no change is made to the cover, hence not requiring any steganalysis. Conventional steganography focuses on invisibility and undetectability, as the main concern is to make the algorithms immune to steganalysis. ![]()
0 Comments
Leave a Reply. |