A New Approach to Estimating Hidden Message Length in Stochastic Modulation Steganography
نویسندگان
چکیده
Information transmission and steganography p. 15 On the existence of perfect stegosystems p. 30 Towards multi-class blind steganalyzer for JPEG images p. 39 An efficient fingerprinting scheme with symmetric and commutative encryption p. 54 Collusion secure convolutional spread spectrum fingerprinting p. 67 Performance study on multimedia fingerprinting employing traceability codes p. 84 Regular simplex fingerprints and their optimality properties p. 97 A robust multi-bit image watermarking algorithm based on HMM in wavelet domain p. 110 Robust detection of transform domain additive watermarks p. 124 Multi-band wavelet based digital watermarking using principal component analysis p. 139 A new inter-frame collusion attack and a countermeasure p. 147 Effectiveness of ST-DM watermarking against intra-video collusion p. 158 Oracle attacks and covert channels p. 171 Security of DM quantization watermarking schemes : a practical study for digital images p. 186 A survey of watermarking security p. 201 Countermeasures for collusion attacks exploiting host signal redundancy p. 216 Fingerprinting schemes : identifying the guilty sources using side information p. 231 Practical data-hiding : additive attacks performance analysis p. 244 The return of the sensitivity attack p. 260 Look up table(LUT) method for halftone image watermarking p. 275 New public-key authentication watermarking for JBIG2 resistant to parity attacks p. 286 Software watermarking as a proof of identity : a study of zero knowledge proof based software watermarking p. 299 Watermarking of 3D irregular meshes based on wavelet multiresolution analysis p. 313 Digital watermarking robustness and fragility characteristics : new modelling and coding influence p. 325 New geometric analysis of spread-spectrum data hiding with repetition coding, with implications for side-informed schemes p. 336 Trellis-coded rational dither modulation for digital watermarking p. 351 Closed-form formulas for private watermarking capacities of Laplacian sources with the magnitude-error distortion measure and under additive attacks p. 361 Improved QIM strategies for Gaussian watermarking p. 372 On the achievable rate of side informed embedding techniques with steganographic constraints p. 387 Performance lower bounds for existing and new uncoded digital watermarking modulation techniques p. 403 Evaluation of feature extraction techniques for robust watermarking p. 418 Perceptual video watermarking in the 3D-DWT domain using a multiplicative approach p. 432 Robustness enhancement of content-based watermarks using entropy masking effect p. 444 Secure mutual distrust transaction tracking using cryptographic elements p. 459
منابع مشابه
A High Capacity Email Steganography Scheme using Dictionary
The main objective of steganography is to conceal a secret message within a cover-media in such a way that only the original receiver can discern the presence of the hidden message. The cover-media can be a text, email, audio, image, and video, which can be transmitted through a public channel, such as the Internet. By extending the use of email among Internet users, the provision of email steg...
متن کاملMaximum likelihood estimation of length of secret message embedded using ±k steganography in spatial domain
In this paper, we propose a new method for estimating the number of embedding changes for non-adaptive ±K embedding in images. The method uses a high-pass FIR filter and then recovers an approximate message length using a Maximum Likelihood Estimator on those stego image segments where the filtered samples can be modeled using a stationary Generalized Gaussian random process. It is shown that f...
متن کاملSteganalysis of Images Created in Wavelet Domain Using Quantization Modulation
The goal of steganography is to avoid drawing suspicion in the transmission of multi-medium hidden message. But some evil may use medium to carry out some uncontrolled and unlimited information The multi-medium industry and many experts have aware of the ponderance of situation in network security and copyright protection. In this paper, we proposed a novel method to reveal existence of hidden ...
متن کاملDigital image steganography using stochastic modulation
In this paper, we present a new steganographic paradigm for digital images in raster formats. Message bits are embedded in the cover image by adding a weak noise signal with a specified but arbitrary probabilistic distribution. This embedding mechanism provides the user with the flexibility to mask the embedding distortion as noise generated by a particular image acquisition device. This type o...
متن کاملDetection of LSB Steganography via Sample Pair Analysis
This paper introduces a new, principled approach to detecting LSB steganography in digital signals such as images and audio. It is shown that the length of hidden message embedded in the least significant bits of signal samples can be estimated with relatively high precision. The new steganalytic approach is based on some statistical measures of sample pairs that are highly sensitive to LSB emb...
متن کاملOn estimation of secret message length in LSB steganography in spatial domain
In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. We introduce the concept of a weighted stego image and then formulate the problem of determining the unknown message length as a simple optimization problem. The methodology is further refined to obtain more stable and...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005