F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis

نویسنده

  • Andreas Westfeld
چکیده

Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. The newly developed algorithm F5 withstands visual and statistical attacks, yet it still offers a large steganographic capacity. F5 implements matrix encoding to improve the efficiency of embedding. Thus it reduces the number of necessary changes. F5 employs permutative straddling to uniformly spread out the changes over the whole steganogram.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hide and Seek in JPEG Images

Recently, the JPEG images are the most common format for storing images. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. So it attracted the attention of researchers as the main steganographic format. There are many new and powerful steganography and steganalysis techniques in JPEG images reported in the literature, in the last few years. In this paper, ...

متن کامل

Android-Based Digital Image Steganography and Steganalysis

Steganography is the discipline concerned with achieving confidential communication by hiding information in plain sight. Media for hiding this information include images, video, audio and markup languages (Papapanagiotou et al. 2005). Steganographic schemes typically exploit information redundancies which are not easily perceptible. Digital images tend to exhibit such redundancy, and thus ...

متن کامل

Steganalysis of JPEG Images: Breaking the F5 Algorithm

In this paper, we present a steganalytic method that can reliably detect messages (and estimate their size) hidden in JPEG images using the steganographic algorithm F5. The key element of the method is estimation of the cover-image histogram from the stego-image. This is done by decompressing the stego-image, cropping it by four pixels in both directions to remove the quantization in the freque...

متن کامل

J4: JPEG Steganography using Dual Histogram Compensation

Steganography is the art of secret communication between two parties that not only conceals the contents of a message, but also its existence. Steganalysis attempts to detect the existence of embedded data in a steganographically altered cover file. Many algorithms have been proposed, but so far each has had some weakness that has allowed its effects to be detected, usually through first or sec...

متن کامل

Steganalysis Against Equivalent Transformation Based Steganographic Algorithm for PDF Files

The equivalent transformation based steganographic algorithm for PDF files shows good performance, both in capacity and invisibility. In addition, data embedding by this algorithm need not change the size of a cover-file. However, a loophole exists in the steganographic scheme. Through analyzing the structure of a PDF file, we can reconstruct a PDF file by using the software tool according to t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001