A Sarkar, K Solanki… - … , and Watermarking of …, 2008 - spiedigitallibrary.org
We present further extensions of yet another steganographic scheme (YASS), a method based on embedding data in randomized locations so as to resist blind steganalysis. YASS …
Recently, merging signal processing techniques with information security services has drawn a lot of attention. Steganography and steganalysis are among those trends. Like their …
Universal quantitative steganalysis suffers from the curse of dimensionality and requires large number of instances (training samples) to produce qualitative results. In this paper, a …
W Luo, H Li, Q Yan, R Yang, J Huang - ACM Transactions on Multimedia …, 2018 - dl.acm.org
Digital multimedia steganalysis has attracted wide attention over the past decade. Currently, there are many algorithms for detecting image steganography. However, little research has …
This paper presents a novel method for detection of LSB matching steganography in grayscale images. This method is based on the analysis of the differences between …
C Jin, R Wang, D Yan - Multimedia Tools and Applications, 2017 - Springer
MP3Stego is a typical steganographic tool for MP3 audios, whose embedding behavior disturbs the intrinsic correlation of the quantized MDCT coefficients (refer to as QMDCTs). In …
The image acquisition device, the light is filtered through a Color Filter Array (CFA), where each pixel captures only one color (from Red, Green, and Blue), while others are calibrated …
M Sheikhan, M Pezhmanpour, MS Moin - Neural Computing and …, 2012 - Springer
Steganography is the science of hiding information in a media such as video, image or audio files. On the other hand, the aim of steganalysis is to detect the presence of embedded …
S Deepa, R Umarani - International Journal of Advanced …, 2017 - search.ebscohost.com
Image steganography techniques can be classified into two major categories such as spatial domain techniques and frequency domain techniques. In spatial domain techniques the …