Universal distortion function for steganography in an arbitrary domain

V Holub, J Fridrich, T Denemark - EURASIP Journal on Information …, 2014 - Springer
Currently, the most successful approach to steganography in empirical objects, such as
digital media, is to embed the payload while minimizing a suitably defined distortion …

Medical JPEG image steganography based on preserving inter-block dependencies

X Liao, J Yin, S Guo, X Li, AK Sangaiah - Computers & Electrical …, 2018 - Elsevier
With the development of computer and biomedical technologies, medical JPEG images
contain the patients' personal information and the security of the private information attracts …

Secure binary image steganography based on minimizing the distortion on the texture

B Feng, W Lu, W Sun - IEEE transactions on Information …, 2014 - ieeexplore.ieee.org
Most state-of-the-art binary image steganographic techniques only consider the flipping
distortion according to the human visual system, which will be not secure when they are …

Improved reversible data hiding in JPEG images based on new coefficient selection strategy

FT Wedaj, S Kim, HJ Kim, F Huang - EURASIP Journal on Image and …, 2017 - Springer
Recently, reversible data hiding (RDH) techniques for JPEG images have become more
extensively used to combine image and authentication information conveniently into one file …

信息隐藏研究展望

张新鹏, 钱振兴, 李晟 - 应用科学学报, 2016 - jas.shu.edu.cn
网络信息有3 类, 分别用于描述客观世界, 记录人类行为, 描述虚拟世界. 现有信息隐藏技术大多
以第1 类信息为载体, 以轻微修改载体数据的方式进行隐蔽通信, 并保证感知逼真与统计逼真 …

A robust image steganography based on the concatenated error correction encoder and discrete cosine transform coefficients

Z Bao, Y Guo, X Li, Y Zhang, M Xu, X Luo - Journal of Ambient Intelligence …, 2020 - Springer
Robust JPEG steganographic algorithms are proposed to protect the embedded message
when the covert JPEG image is JPEG-compressed in some lossy channel. They usually …

Advancing the JPEG compatibility attack: Theory, performance, robustness, and practice

E Dworetzky, E Kaziakhmedov, J Fridrich - Proceedings of the 2023 …, 2023 - dl.acm.org
The JPEG compatibility attack is a steganalysis method for detecting messages embedded
in the spatial representation of an image under the assumption that the cover image was a …

Adaptive text steganography by exploring statistical and linguistical distortion

H Huanhuan, Z Xin, Z Weiming… - 2017 IEEE Second …, 2017 - ieeexplore.ieee.org
Most state-of-the-art text steganographic techniques keep the semantic of cover texts almost
unchanged based on synonym substitution, but some statistical features of cover texts will …

[PDF][PDF] Universal distortion function for steganography in an arbitrary domain

V ech Holub, J Fridrich… - EURASIP …, 2014 - jis-eurasipjournals.springeropen …
Currently, the most successful approach to steganography in empirical objects, such as
digital media, is to embed the payload while minimizing a suitably defined distortion …

[图书][B] Content Adaptive Steganography: Design and Detection

V Holub - 2014 - dde.binghamton.edu
Currently, the most successful approach to steganography in empirical objects, such as
digital images, is to embed the payload while minimizing a suitably defined distortion …