From the perspective of signal detection theory, it seems obvious that knowing the probabilities with which the individual cover elements are modified during message …
P Schöttle, R Böhme - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
According to conventional wisdom, content-adaptive embedding offers more steganographic security than random uniform embedding. We scrutinize this view and note that it is barely …
X Shi, B Tondi, B Li, M Barni - Signal Processing: Image Communication, 2020 - Elsevier
CNN-based steganalysis has recently achieved very good performance in detecting content- adaptive steganography. At the same time, recent works have shown that, by adopting an …
H Wu, X Zhang - IETE Technical Review, 2021 - Taylor & Francis
Separable reversible watermarking enables two encoders to separately embed a payload in a cover, and the original cover can be reconstructed by cooperation. It is required to limit the …
Two players, Alice and Bob play the following game. A list of positive numbers d1, d2,..., dn and an integer 1 k n are given. Alice chooses a k-element subset S of 11, 2,..., nl and …
B Tondi - University of Siena: PhD Thesis, 2016 - clem.dii.unisi.it
Theoretical Foundations of Adversarial Detection and Applications to Multimedia Forensics Page 1 Theoretical Foundations of Adversarial Detection and Applications to Multimedia …
Today, the most secure steganographic schemes for digital images embed secret messages while minimizing a distortion function that describes the local complexity of the content …
The steganographic field is nowadays dominated by heuristic approaches for data hiding. While there exist a few model-based steganographic algorithms designed to minimize …