Access the full text.
Sign up today, get DeepDyve free for 14 days.
V Holub (2012)
234
J Fridrich, M Goljan, P Lisonek, D Soukal (2005)
Writing on wet paperIEEE Trans Signal Process, 53
V Holub, J Fridrich (2013)
Random projections of residuals for digital image steganalysisIEEE Trans Inf Forensics Secur, 8
L Guo (2012)
169
B Li, M Wang, J Huang, X Li (2014)
Proceedings of the IEEE International conference on image processing. Paris
T Denemark (2014)
48
A Ker (2008)
107
J Fridrich, J Kodovský (2012)
Rich models for steganalysis of digital imagesIEEE Trans Inf Forensics Secur, 7
T Pevny (2010)
161
T Filler, T Pevný, P Bas (2011)
IH. LNCS, vol 6958
J Kodovský (2012)
432IEEE Trans Inf Forensics Secur, 7
J Kodovský, J Fridrich, V Holub (2012)
Ensemble classifiers for steganalysis of digital mediaIEEE Trans Inf Forensics Secur, 7
V Holub (2013)
1996IEEE Trans Inf Forensics Secur, 8
V Holub (2015)
219IEEE Trans Inf Forensics Secur, 10
Z Zhao, Q Guan, X Zhao, H Yu, C liu (2016)
The 15th international workshop on digital-forensics and watermarking (IWDW2016), accepted
T Filler, J Judas, J Fridrich (2011)
Minimizing additive distortion in steganography using syndrome-trellis codesIEEE Trans Inf Forensics Secur, 6
T Denemark, V Sedighi, V Holub, R Cogranne, J Fridrich (2014)
Proceedings of the IEEE international workshop on information forensic and security. Atlanta
V Holub, J Fridrich (2013)
Proceedings of the 1st ACM workshop information hiding multimedia security. ACM, New York
J Fridrich (2005)
3923IEEE Trans Signal Process, 53
A Ker, T Pevný, J Kodovský, J Fridrich (2008)
Proceedings of the 10th ACM workshop on multimedia and security. ACM, New York
V Holub (2013)
59
T Filler (2011)
920IEEE Trans Inf Forensics Secur, 6
A Ker, T Pevný (2012)
ACM Proceeding of the on multimedia and security. ACM, New York,
J Fridrich (2012)
868IEEE Trans Inf Forensics Secur, 7
P Sallee (2003)
154
B Li (2014)
4206
V Holub, J Fridrich (2015)
Low-complexity features for JPEG steganalysis using undecimated DCTIEEE Trans Inf Forensics Secur, 10
L Guo, ShiY Ni j (2012)
IEEE International workshop on information forensic and security (WIFS). Tenerife
A Ker (2012)
1
V Holub, J Fridrich (2012)
Proceedings of the IEEE international workshop on information forensic and security. Tenerife
T Pevny, T Filler, P Bas (2010)
Information hiding (Lecture Notes in Computer Science). Springer-Verlag, Berlin
A Westfeld (2001)
Information hiding (Lecture Notes in Computer Science), vol 2137
P Sallee (2003)
Digital watermarking (Lecture Notes in Computer Science), vol 2939
In this paper, we present a universal embedding strategy for batch adaptive steganography in both spatial and JPEG domain. This strategy can make up for the problem when applying batch steganography to adaptive steganography in JPEG domain meanwhile improve the secure performance in spatial domain. When embedding, the strategy are employed to determine the sub-batch of cover images to carry the total message. To evaluate the feasibility of images selected as sub-batch, we calculate the histogram equilibrium for each image and the images with larger “size” and more equilibrated histogram are set a high priority when determining the sub-batch. The histogram equilibrium of images is the combination of entropy and standard deviation for the probability of histogram coefficients. We keep the repetitive information of using entropy and standard deviation to measure the histogram equilibrium. Experimental results show that histogram equilibriums vary according to images and employing images with larger “size” and more equilibrated histogram to carry the total message is a universal embedding strategy for both spatial and JPEG domain. Batch adaptive steganography with this embedding strategy can improve the secure performance effectively.
Multimedia Tools and Applications – Springer Journals
Published: Aug 3, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.