F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis
نویسنده
چکیده
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. The newly developed algorithm F5 withstands visual and statistical attacks, yet it still offers a large steganographic capacity. F5 implements matrix encoding to improve the efficiency of embedding. Thus it reduces the number of necessary changes. F5 employs permutative straddling to uniformly spread out the changes over the whole steganogram.
منابع مشابه
Hide and Seek in JPEG Images
Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...
متن کاملAndroid-Based Digital Image Steganography and Steganalysis
Steganography is the discipline concerned with achieving confidential communication by hiding information in plain sight. Media for hiding this information include images, video, audio and markup languages (Papapanagiotou et al. 2005). Steganographic schemes typically exploit information redundancies which are not easily perceptible. Digital images tend to exhibit such redundancy, and thus ...
متن کاملSteganalysis of JPEG Images: Breaking the F5 Algorithm
In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done by decompressing the stego-image, cropping it by four pixels in both directions to remove the quantization in the freque...
متن کاملJ4: JPEG Steganography using Dual Histogram Compensation
Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...
متن کاملSteganalysis Against Equivalent Transformation Based Steganographic Algorithm for PDF Files
The equivalent transformation based steganographic algorithm for PDF files shows good performance, both in capacity and invisibility. In addition, data embedding by this algorithm need not change the size of a cover-file. However, a loophole exists in the steganographic scheme. Through analyzing the structure of a PDF file, we can reconstruct a PDF file by using the software tool according to t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001