X Liao, J Yin, S Guo, X Li, AK Sangaiah - Computers & Electrical …, 2018 - Elsevier
With the development of computer and biomedical technologies, medical JPEG images contain the patients' personal information and the security of the private information attracts …
B Feng, W Lu, W Sun - IEEE transactions on Information …, 2014 - ieeexplore.ieee.org
Most state-of-the-art binary image steganographic techniques only consider the flipping distortion according to the human visual system, which will be not secure when they are …
FT Wedaj, S Kim, HJ Kim, F Huang - EURASIP Journal on Image and …, 2017 - Springer
Recently, reversible data hiding (RDH) techniques for JPEG images have become more extensively used to combine image and authentication information conveniently into one file …
Z Bao, Y Guo, X Li, Y Zhang, M Xu, X Luo - Journal of Ambient Intelligence …, 2020 - Springer
Robust JPEG steganographic algorithms are proposed to protect the embedded message when the covert JPEG image is JPEG-compressed in some lossy channel. They usually …
The JPEG compatibility attack is a steganalysis method for detecting messages embedded in the spatial representation of an image under the assumption that the cover image was a …
H Huanhuan, Z Xin, Z Weiming… - 2017 IEEE Second …, 2017 - ieeexplore.ieee.org
Most state-of-the-art text steganographic techniques keep the semantic of cover texts almost unchanged based on synonym substitution, but some statistical features of cover texts will …
Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion …
Currently, the most successful approach to steganography in empirical objects, such as digital images, is to embed the payload while minimizing a suitably defined distortion …