90
Views
3
CrossRef citations to date
0
Altmetric
Research Articles

USAD: undetectable steganographic approach in DCT domain

ORCID Icon, , , ORCID Icon &
Pages 237-253 | Received 01 Feb 2018, Accepted 25 Apr 2019, Published online: 07 Jun 2019

References

  • Chen C, Shi YQ. Jpeg image steganalysis utilizing both intrablock and interblock correlations. In: 2008 IEEE International Symposium on Circuits and Systems; 2008. p. 3029–3032. doi:10.1109/ISCAS.2008.4542096
  • Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security, Sec '11. New York (NY): ACM; 2011. p. 77–86. doi:10.1145/2037252.2037267
  • Holub V, Fridrich J. Designing steganographic distortion using directional filters. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS). IEEE; 2012. p. 234–239. doi:10.1109/WIFS.2012.6412655
  • Fridrich J, Pevný T, Kodovský J. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In Proceedings of the 9th Workshop on Multimedia & Security. New York (NY): ACM; 2007. p. 3–14. doi:10.1145/1288869.1288872
  • Fakhredanesh M, Safabakhsh R, Rahmati M. A model-based image steganography method using Watson's visual model. ETRI J. 2014;36(3):479–489. doi:10.4218/etrij.14.0113.0171
  • Mao J, Huang Y, Niu X, et al. A method to estimate the steganographic capacity in DCT domain based on MCUU model. Wuhan Univ J Nat Sci. 2016;21(4):283–290. doi:10.1007/s11859-016-1172-7 doi: 10.1007/s11859-016-1172-7
  • Soria-Lorente A, Berres S. A secure steganographic algorithm based on frequency domain for the transmission of hidden information. Secur Commun Netw. 2017. doi:10.1155/2017/5397082
  • Attaby AA, Ahmed MFM, Alsammak AK. Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Eng J. 2018;9:1965–1974. doi:10.1016/j.asej.2017.02.003
  • Upham D. Available from: https://zooid.org/paul/crypto/jsteg/.
  • Westfeld A, Pfitzmann A. Attacks on steganographic systems. Berlin: Springer–Berlin–Heidelberg; 2000. p. 61–76. doi:10.1007/10719724_5
  • Westfeld A. F5–a steganographic algorithm. In: Information Hiding. Springer–Berlin–Heidelberg; 2001. p. 289–302. doi:10.1007/3-540-45496-9_21
  • Fridrich JJ, Goljan M, Hogea D. Steganalysis of JPEG images: breaking the F5 algorithm. In: Revised Papers from the 5th International Workshop on Information Hiding, IH '02. London: Springer; 2003. p. 310–323. doi:10.1007/3-540-36415-3_20
  • Provos N. Available from: http://cimarron.river.com/mirrors/www.outguess.org/
  • Provos N, Provos N. Defending against statistical steganalysis. In: 10th USENIX Security Symposium; 2001. p. 323–335. doi: 10.1145/103085.103089
  • Fridrich J, Goljan M, Hogea D. Attacking the outguess; 2002. ISBN 978-3-540-36415-3
  • Solanki K, Sarkar A, Manjunath BS. YASS: yet another steganographic scheme that resists blind steganalysis. In: Furon T, Cayre F, Doërr G, Bas P, editors. Information hiding. Berlin: Springer–Berlin–Heidelberg; 2007. p. 16–31. doi:10.1007/978-3-540-77370-2_2
  • Yu X, Babaguchi N. Breaking the YASS algorithm via pixel and DCT coefficients analysis. In: ICPR 2008: 19th International Conference on Pattern recognition; 2008. p. 1–4. doi:10.1.1.214.5505
  • Kodovsk J, Pevn T, Fridrich J. Modern steganalysis can detect YASS; 2010. doi:10.1117/12.838768
  • Liu Q. Steganalysis of DCT-embedding based adaptive steganography and YASS. In: Proceedings of the Thirteenth ACM Multimedia Workshop on Multimedia and Security. New York (NY): ACM; 2011. p. 77–86. doi:10.1145/2037252.2037267
  • Lyu S, Farid H. Detecting hidden messages using higher-order statistics and support vector machines. In: Revised Papers from the 5th International Workshop on Information Hiding, IH '02; 2003. p. 340–354. doi:10.1007/3-540-36415-3_22
  • Pevny` T, Fridrich J. Multi-class blind steganalysis for JPEG images. In: Proceedings of the SPIE on Security and Watermarking of Multimedia Contents VIII 6072 (1); 2006. p. 257–269. doi:10.1117/12.640943
  • Pevn T, Fridrich J. Merging Markov and DCT features for multi-class JPEG steganalysis; 2007. doi:10.1117/12.696774
  • Saidi M, Hermassi H, Rhouma R, et al. A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl. 2017;76(11):13493–13510. doi:10.1007/s11042-016-3722-6
  • Lam EY, Goodman JW. A mathematical analysis of the DCT coefficient distributions for images. IEEE Trans Image Process. 2000;9(10):1661–1666. doi:10.1109/83.869177
  • Lin Y-K. A data hiding scheme based upon DCT coefficient modification. Comput Stand Interfaces. 2014;36(5):855–862. doi:10.1016/j.csi.2013.12.013
  • Hao P, Shi Q. Matrix factorizations for reversible integer mapping. IEEE Trans Signal Process. 2001;49(10):2314–2324. doi:10.1109/78.950787
  • Erramilli A, Singh RP, Pruthi P. Modeling packet traffic with chaotic maps; 1994. doi:10.1.1.46.8102
  • Ott E. Chaos in dynamical systems. Cambridge, UK: Cambridge University Press; 2002. doi:10.1017/CBO9780511803260
  • Kennedy MP. A nonlinear dynamics interpretation of algorithmic a/d conversion. Int J Bifurc Chaos. 1995;5:891–893. doi:10.1142/S0218127495000685
  • Cheng H, Huang C, Ding Q, et al. An efficient image encryption scheme based on zuc stream cipher and chaotic logistic map. In: Pan J-S, Snasel V, Corchado ES, Abraham A, Wang S-L, editors. Intelligent data analysis and its applications. Vol. II. Cham: Springer International Publishing; 2014. p. 301–310. doi:10.1007/978-3-319-07773-4_30
  • Baker GL, Gollub JP. Chaotic dynamics an introduction; 1990. doi:10.1063/1.2810630
  • Xu H, Qian X, Liang Y, et al. The study of a new hyperchaotic and its binarization algorithm. J Inf Comput Sci. 2014;11:473–480. doi:10.12733/jics20102787 doi: 10.12733/jics20102787
  • Rukhin A, Soto J, Nechvatal J. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, version sts- 2.1; 2010. doi:10.1.1.153.2597
  • Hore A, Ziou D. Image quality metrics: PSNR vs. SSIM. In: 2010 20th International Conference on Pattern Recognition; 2010. p. 2366–2369. doi:10.1109/ICPR.2010.579
  • Ker AD, Bas P, Böhme R, et al. Moving steganography and steganalysis from the laboratory into the real world. In: Proceedings of the First ACM Workshop on Information Hiding and Multimedia Security, MMSec '13. New York, (NY): ACM; 2013. p. 45–58. doi:10.1145/2482513.2482965
  • Kodovsky J, Fridrich J, Holub V. Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur. 2012;7(2):432–444. doi:10.1109/TIFS.2011.2175919
  • Fridrich J, Kodovsky J. Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur. 2012;7(3):868–882. doi:10.1109/TIFS.2012.2190402
  • Bas P, Filler T, Pevný T. “Break our steganographic system”: the ins and outs of organizing boss. In: Filler T, Pevný T, Craver S, Ker A, editors. Information hiding. Berlin: Springer–Berlin–Heidelberg; 2011. p. 59–70. doi:10.1007/978-3-642-24178-9_5

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.