A framework for synthetic stego
Abstract
References
Index Terms
- A framework for synthetic stego
Recommendations
Classification Method of Jsteg Stego-Images and F5 Stego-Image
ICICIC '09: Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and ControlJsteg and F5 are two typical steganography methods of JPEG images and have been used widely. To distinguish F5 stego images and Jsteg stego images, a classification algorithm based on sensitive features and SVM classifier is presented, where the ...
Stego key recovery based on the optimal hypothesis test
At present, research on steganalysis is mainly focused on the existence detection of hidden messages. However, the extraction of hidden messages, i.e., extraction attacks, also plays a decisive role in tasks such as obtaining evidence of covert ...
Authenticable reversible data hiding scheme with less distortion in dual stego-images
In reversible data hiding, dual image-based data hiding methods are recently proposed, in which two stego-images are generated after embedding the secret data. In this paper, a new reversible data hiding method is proposed to provide less distortion and ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Research-article
Funding Sources
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 140Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in