A secure adaptive Hidden Markov Model-based JPEG steganography method: (J-HMMSteg)

D Laishram, T Tuithung - Multimedia Tools and Applications, 2024 - Springer
JPEG image steganography technique designed for data embedding with minimal distortion.
J-HMMSteg employed a block-wise analysis approach to … ‘Steganalysis’ or ‘attacks’ refer to …

Secure robust JPEG steganography based on autoencoder with adaptive BCH encoding

W Lu, J Zhang, X Zhao, W Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… To resist a steganalysis attack, adaptive steganographic methods have been developed in
recent years. State-of-the-art methods [9]–[16] have designed distortion functions to evaluate …

Secure high payload steganography: A model-based approach

T Rabie, M Baziyad, I Kamel - Journal of Information Security and …, 2021 - Elsevier
attacked as in [27], Chen and Shi, attacked MB2 and other JPEG-based algorithms using
a Markov Process (MP) that exploits the intra-block and inter-block correlations among JPEG

Evasion attack steganography: Turning vulnerability of machine learning to adversarial attacks into a real-world application

S Ghamizi, M Cordy, M Papadakis… - Proceedings of the …, 2021 - openaccess.thecvf.com
… We apply JPEG compression with 90% and 50% quality rates (resulting in loss of information
of 10% and 50%, respectively) and CDR (to 8 bits, ie pictures with only 1/12 of the original …

Destroying robust steganography in online social networks

Z Zhu, S Li, Z Qian, X Zhang - Information Sciences, 2021 - Elsevier
… , effective solution for destroying the robust steganography of … steganography approaches
and existing data hiding attack … The stego images are then compressed into JPEG files using …

Efficient JPEG batch steganography using intrinsic energy of image contents

X Hu, J Ni, W Zhang, J Huang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
… to the steganalysis attacks and bring risks to the covert communication. To evaluate the
balance wrt various parameters, two groups of experiments are carried out to allocate payload …

An extensive survey of digital image steganography: State of the art

MA Idakwo, MB Muazu, EA Adedokun… - ATBU Journal of Science …, 2020 - arxiv.org
… to date have been on how to maximize embeddable regions to accommodate more information
amidst limited redundancy bits while maintaining imperceptibility, resistances to attacks

JPEG compatibility attack revisited

E Dworetzky, J Fridrich - IEEE transactions on information forensics and …, 2021 - par.nsf.gov
… The JPEG Compatibility Attack (JCA) is a specialized image steganalysis method that
can reliably detect messages embedded with spatial-domain steganography under the …

A secure image steganography based on modified matrix encoding using the adaptive region selection technique

TD Nguyen, HQ Le - Multimedia Tools and Applications, 2022 - Springer
… an image steganography technique based on modified matrix … to be detected by RS
steganalysis. Moreover, exploiting all … method reduces the ability to against visual attack methods. …

JPEG image steganography payload location based on optimal estimation of cover co-frequency sub-image

J Wang, C Yang, M Zhu, X Song, Y Liu… - EURASIP Journal on …, 2021 - Springer
… in cover JPEG image. Therefore, this paper proposes a JPEG image steganography payload
location method based … , he (or she) can extract the hidden information by a collision attack. …