This paper presents two JPEG steganographic methods using quantization index modulation (QIM) in the discrete cosine transform (DCT) domain. The two methods approximately preserve the histogram of quantized DCT coefficients, aiming at secure JPEG steganography against histogram-based attacks. In comparison with F5 as a representative JPEG steganography, the proposed methods show high performance with regard to embedding rate, PSNR of stego image, and particularly histogram preservation
Steganographic systems attempt to hide communication by embedding messages in an innocuous looking c...
Methods of the steganography are characterized by such efficiency rates as invisibility, robustness ...
International audienceSince the introduction of adaptive steganography, most of the recent research ...
In frequency domain based image steganographic methods, especially Discrete Cosine Transformation (...
[[abstract]]This paper presents a lossless and reversible steganography scheme for hiding secret dat...
JPEG image steganographic techniques use the DCT coefficients scaled by quantization table to make s...
Abstract: Steganography is defined as an art of concealed data sharing for communication that preven...
In this paper, a steganographic technique for hiding secret data in image file formats is proposed. ...
The two most important aspects of any image-based steganographic system are the quality of the steg...
In this paper, we present a novel steganographic method for embedding of secret data in still graysc...
With the spread of digital data around the world through the internet, the security of the data has ...
Information security relies mainly upon encryption, and in some cases, steganography for an extra la...
In this paper, we introduce a DCT based steganographicmethod for gray scale images. The embedding ap...
A novel model-based steganographic technique for JPEG images is proposed where themodel, derived fro...
JPEG Image steganalysis has attracted great attention recently. In this paper, JPEG quantization-dis...
Steganographic systems attempt to hide communication by embedding messages in an innocuous looking c...
Methods of the steganography are characterized by such efficiency rates as invisibility, robustness ...
International audienceSince the introduction of adaptive steganography, most of the recent research ...
In frequency domain based image steganographic methods, especially Discrete Cosine Transformation (...
[[abstract]]This paper presents a lossless and reversible steganography scheme for hiding secret dat...
JPEG image steganographic techniques use the DCT coefficients scaled by quantization table to make s...
Abstract: Steganography is defined as an art of concealed data sharing for communication that preven...
In this paper, a steganographic technique for hiding secret data in image file formats is proposed. ...
The two most important aspects of any image-based steganographic system are the quality of the steg...
In this paper, we present a novel steganographic method for embedding of secret data in still graysc...
With the spread of digital data around the world through the internet, the security of the data has ...
Information security relies mainly upon encryption, and in some cases, steganography for an extra la...
In this paper, we introduce a DCT based steganographicmethod for gray scale images. The embedding ap...
A novel model-based steganographic technique for JPEG images is proposed where themodel, derived fro...
JPEG Image steganalysis has attracted great attention recently. In this paper, JPEG quantization-dis...
Steganographic systems attempt to hide communication by embedding messages in an innocuous looking c...
Methods of the steganography are characterized by such efficiency rates as invisibility, robustness ...
International audienceSince the introduction of adaptive steganography, most of the recent research ...