Detectability-Based JPEG Steganography Modeling the Processing Pipeline: The Noise-Content Trade-off

نویسندگان

چکیده

The current art of steganography shows that schemes using a deflection criterion (such as MiPOD) for JPEG are usually subpar with respect to distortion-based schemes. We link this lack performance poor estimation the variance model noise on cover image. However, statistically-based method provides better assessment detectability hidden data well theoretical guarantees under given model. In paper, we propose obtain estimates variances DCT coefficients by taking into account dependencies introduced development pipeline pixels. A second method, which is side-informed extension Gaussian Embedding in domain quantization error side-information, also formulated and shown achieve state-of-the-art performances. Eventually, trade-off between content complexity thoroughly analyzed through lenses these two new methods wide range numerical experiments.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Optimized Trade-off Decomposition Steganography Algorithm

In this paper a modified Steganography algorithm is proposed. A fuzzification is performed in the message channel to compress the decomposed coefficients before embedding in the cover-image to get a new Stego-image. A relative embedding strength factor (ESF) is used for embedding the secret in the cover-image. The well known metrics (MSE, PSNR, Cor. and Entropy) were used to evaluate quality of...

متن کامل

Modeling the Trade-off between Manufacturing Cell Design and Supply Chain Design

Nowadays, we are witnessing the growth of firms that distribute the production capacity of their products to a wide geographic range to supply the demand of several markets. In this article, the relationships and interactions between cell design and supply chain design are investigated. For this purpose, a novel integrated model is presented for designing dynamic cellular manufacturing systems ...

متن کامل

Challenging the doctrines of JPEG steganography

The design of both steganography and steganalysis methods for digital images heavily relies on empirically justified principles. In steganography, the domain in which the embedding changes are executed is usually the preferred domain in which to measure the statistical impact of embedding (to construct the distortion function). Another principle almost exclusively used in steganalysis states th...

متن کامل

the washback effect of discretepoint vs. integrative tests on the retention of content in knowledge tests

در این پایان نامه تاثیر دو نوع تست جزیی نگر و کلی نگر بر به یادسپاری محتوا ارزیابی شده که نتایج نشان دهندهکارایی تستهای کلی نگر بیشتر از سایر آزمونها است

15 صفحه اول

Simulation-based Modeling X1. the Modeling Pipeline

Simulation-based modeling means the generation of CAD models from simulation results. It is eecient to split this process into several steps, such as collection, triangulation, and segmentation of the data and surface reconstruction. The last step is solved by a physically based approach, which enables interaction intuitively, and we prove the existence and uniqueness of the solution for this c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3050063