Secret key estimation in sequential steganography

S Trivedi, R Chandramouli - IEEE Transactions on Signal …, 2005 - ieeexplore.ieee.org
… in consecutive (time, spatial, or frequency domain) features of a host signal. This work
presents a steganalysis method that estimates the secret key used in sequential embedding. …

Secret key estimation for image sequential steganograph in transform domain

X Luo, D Wang, P Wang, F Liu - IEEE GLOBECOM 2007-IEEE …, 2007 - ieeexplore.ieee.org
… 1] to estimate the secret key for sequential steganography in mid… reliably estimate the secret
key for mid- and high-frequency … steganography in DCT domain, we put forward an improved …

An improved secret key estimation method for sequential steganography

P Wang, X Luo, F Liu - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
… using sequential steganography. Note that the secret key in this paper means the beginning
and end of the embedded messages. Sequential steganography is that secret messages …

[PDF][PDF] Stego key estimation in LSB steganography

J Liu, G Tang - Journal of Multimedia, 2012 - Citeseer
steganographic algorithm. Trivedi et al.[7][8] presented a method for secret key estimation
in sequential steganography. The authors used a sequential probability ratio test to determine …

[PDF][PDF] Secret Key Estimation in Sequential

S Trivedi - 2003 - researchgate.net
… as those class of embedding algorithms that hide messages in consecutive (time, spatial or
… a steganalysis method that estimates the secret key used in sequential steganography. A …

A New Approach of Steganography Using Center Sequential Technique

D Darwis, A Junaidi - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
… The steganography covers and secret images used for the testing in this study are images
with several extension formats namely jpg and png with various sizes and dimensions of pixels…

[PDF][PDF] A novel security scheme for secret data using cryptography and steganography

S Phad Vitthal, S Bhosale Rajkumar… - IJ Computer Network …, 2012 - Citeseer
steganography method exploits the difference value of two consecutive pixels to estimate how
many secret … AES uses 128 bit private key which is very hard to break. PVD and K-bit LSB …

[PDF][PDF] A secret-key image steganography technique using random chain codes

MAF Al-Husainy, DM Uliyan - International Journal of Technology, 2019 - researchgate.net
… , a secret key image steganography technique has been implemented using chains of a
random sequence of … The evaluation tests of the proposed technique showed that the technique …

Secret Key Steganography: improve security level of LSB algorithm

AIH Al-Jarah, JLO Arjona - 2021 IEEE 12th Annual Ubiquitous …, 2021 - ieeexplore.ieee.org
sequence of the secret message. The main idea is occupying less space given to the … ,
comparisons and experimental results for the evaluation of the SKLSB algorithm are presented. …

A steganography approach for sequential data encoding and decoding in video images

M Ramalingam, NAM Isa - 2014 International Conference on …, 2014 - ieeexplore.ieee.org
steganography system involving a secret key. The common terms used in a modern
steganography … The qualitative evaluation of the proposed method is discussed and the resulting …