Abstract
For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools are being developed to detect and reveal its secrets.
- Berghel, H. and O'Gorman, L. Protecting ownership rights through digital watermarks. IEEE Comput. 29, 7 (July 1996), 101--103. Google ScholarDigital Library
- Chen, B. and Wornell, G. Quantization index modulation: A class of provably good methods for watermarking and information embedding. IEEE Transact. Info. Theory 47, 4 (May 2001), 1423--1443. Google ScholarDigital Library
- Fridrich, J. and Goljan, M. Practical steganalysis of digital images: State of the art. In Proceedings of SPIE, Security and Watermarking Multimedia Contents IV (San Jose, CA, Jan. 21--24). International Society for Optical Engineering, 2002, 1--13.Google ScholarCross Ref
- Johnson, N. and Jajodia, S. Exploring steganography: Seeing the unseen. IEEE Comput. 31, 2 (Feb. 1998), 26--34. Google ScholarDigital Library
- Katzenbeisser, S. and Petitcolas, F. Defining security in steganographic systems. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents IV (San Jose, CA, Jan 21--24). International Society for Optical Engineering, 2002, 50--56.Google Scholar
- Kovacich, G. and Jones, A. What infosec professionals should know about information warfare tactics by terrorists (Parts 1 and 2). Comput. & Sec. 21, 1 (Jan. 2002), 35--41; 21, 2 (Mar. 2002), 113--119.Google Scholar
- Marvel, L., Boncelet, C., Jr., and Retter, C. Spread-spectrum image steganography. IEEE Transact. Image Process. 8, 8 (Aug. 1999), 1075--1083. Google ScholarDigital Library
- Memon, N. and Wong, P. Protecting digital media content. Commun. ACM 41, 7 (July 1998), 34--43. Google ScholarDigital Library
- Moskowitz, I., Longdon, G., and Chang, L. A new paradigm hidden in steganography. In Proceedings of the 2000 Workshop on New Security Paradigms (Ballycotton, County Cork, Ireland, Sept. 18--21). ACM Press, New York, 2000, 41--50. Google ScholarDigital Library
- Provos, N. and Honeyman, P. Detecting steganographic content on the Internet. In Proceedings of Network and Distributed System Security Symposium (San Diego, Feb. 6--8). Internet Society, Reston, VA, 2002.Google Scholar
- Westfeld, A. F5-Steganographic algorithm: High capacity despite better steganalysis. In Lecture Notes in Computer Science 2137. Springer-Verlag, Berlin, 2001, 289--302. Google ScholarDigital Library
- Westfeld, A. Detecting low embedding rates. In Lecture Notes in Computer Science 2137. Springer-Verlag, Berlin, 2003, 324--339. Google ScholarDigital Library
Index Terms
- Cyber warfare: steganography vs. steganalysis
Recommendations
A region-adaptive semi-fragile dual watermarking scheme
Since existing watermarking schemes usually have only a single function, a region-adaptive semi-fragile dual watermarking scheme is proposed, taking into account both watermark embedding capacity and security. The dual watermarks refer to the robust ...
A steganographic method based upon JPEG and quantization table modification
Special issue: Intelligent multimedia computing and networkingIn this paper, a novel steganographic method based on joint photographic expert-group (JPEG) is proposed. The proposed method modifies the quantization table first. Next, the secret message is hidden in the cover-image with its middle-frequency of the ...
An adaptive steganographic method based on the measurement of just noticeable distortion profile
This paper presents an adaptive steganographic method based on just noticeable distortion (JND) profile measurement. According to the input requirements, our method can produce a higher quality or higher embedding capacity stego-image. In the embedding ...
Comments