Journal ArticleDOI
Detecting LSB steganography in color, and gray-scale images
TLDR
In this article, a reliable and accurate method for detecting least significant bit (LSB) nonsequential embedding in digital images is described. But this method relies on the assumption that the secret message length is derived by inspecting the lossless capacity in the LSB and shifted LSB plane.Abstract:
We describe a reliable and accurate method for detecting least significant bit (LSB) nonsequential embedding in digital images. The secret message length is derived by inspecting the lossless capacity in the LSB and shifted LSB plane. An upper bound of 0.005 bits per pixel was experimentally determined for safe LSB embedding.read more
Citations
More filters
Book
Digital Watermarking
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Journal ArticleDOI
Review: Digital image steganography: Survey and analysis of current methods
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.
Journal ArticleDOI
LSB matching revisited
TL;DR: The proposed modification to the least-significant-bit (LSB) matching, a steganographic method for embedding message bits into a still image, shows better performance than traditional LSB matching in terms of distortion and resistance against existing steganalysis.
Book
Steganography in Digital Media: Principles, Algorithms, and Applications
TL;DR: This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Journal ArticleDOI
Edge Adaptive Image Steganography Based on LSB Matching Revisited
TL;DR: An edge adaptive scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image is proposed and can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, while preserving higher visual quality of stego images at the same time.
References
More filters
Journal ArticleDOI
On the limits of steganography
TL;DR: It is shown that public key information hiding systems exist, and are not necessarily constrained to the case where the warden is passive, and the use of parity checks to amplify covertness and provide public key steganography.
Book ChapterDOI
Attacks on Steganographic Systems
TL;DR: In this paper, the authors present both visual and statistical attacks, making use of the ability of humans to clearly discern between noise and visual patterns, and automate statistical attacks which are much easier to automate.
Journal ArticleDOI
Exploring steganography: Seeing the unseen
Neil F. Johnson,Sushil Jajodia +1 more
TL;DR: It is argued that steganography by itself does not ensure secrecy, but neither does simple encryption, and if these methods are combined, however, stronger encryption methods result.
Book ChapterDOI
Steganalysis of Images Created Using Current Steganography Software
Neil F. Johnson,Sushil Jajodia +1 more
TL;DR: Characteristics in current steganography software that direct the steganalyst to the existence of a hidden message are identified and the ground work of a tool for automatically detecting theexistence of hidden messages in images is introduced.