Minimizing additive distortion in steganography using syndrome-trellis codes

T Filler, J Judas, J Fridrich - IEEE Transactions on Information …, 2011 - ieeexplore.ieee.org
This paper proposes a complete practical methodology for minimizing additive distortion in
steganography with general (nonbinary) embedding operation. Let every possible value of …

[图书][B] Steganography in digital media: principles, algorithms, and applications

J Fridrich - 2009 - books.google.com
Steganography, the art of hiding of information in apparently innocuous objects or images, is
a field with a rich heritage, and an area of rapid current development. This clear, self …

[图书][B] Digital watermarking and steganography

I Cox, M Miller, J Bloom, J Fridrich, T Kalker - 2007 - books.google.com
Digital audio, video, images, and documents are flying through cyberspace to their
respective owners. Unfortunately, along the way, individuals may choose to intervene and …

Efficient steganographic embedding by exploiting modification direction

X Zhang, S Wang - IEEE Communications letters, 2006 - ieeexplore.ieee.org
A novel method of steganographic embedding in digital images is described, in which each
secret digit in a (2n+ 1)-ary notational system is carried by n cover pixels and, at most, only …

Matrix embedding for large payloads

J Fridrich, D Soukal - IEEE Transactions on Information …, 2006 - ieeexplore.ieee.org
Matrix embedding is a previously introduced coding method that is used in steganography to
improve the embedding efficiency (increase the number of bits embedded per embedding …

New blind steganalysis and its implications

M Goljan, J Fridrich, T Holotyak - … , and Watermarking of …, 2006 - spiedigitallibrary.org
The contribution of this paper is two-fold. First, we describe an improved version of a blind
steganalysis method previously proposed by Holotyak et al. and compare it to current state …

Minimizing embedding impact in steganography using trellis-coded quantization

T Filler, J Judas, J Fridrich - Media forensics and security II, 2010 - spiedigitallibrary.org
In this paper, we propose a practical approach to minimizing embedding impact in
steganography based on syndrome coding and trellis-coded quantization and contrast its …

Capacity bounds and constructions for reversible data-hiding

TON Kalker, FMJ Willems - 2002 14th International Conference …, 2002 - ieeexplore.ieee.org
An undesirable side effect of many watermarking and data-hiding schemes is that the host
signal into which auxiliary data is embedded is distorted. Finding an optimal balance …

Designing near-optimal steganographic codes in practice based on polar codes

W Li, W Zhang, L Li, H Zhou… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Steganography is an information hiding technique for covert communication. So far
Syndrome-Trellis Codes (STC), a convolutional codes-based method, is the only near …

Practical methods for minimizing embedding impact in steganography

J Fridrich, T Filler - Security, Steganography, and …, 2007 - spiedigitallibrary.org
In this paper, we propose a general framework and practical coding methods for
constructing steganographic schemes that minimize the statistical impact of embedding. By …