Skip to main content

Secure Steganography in Multimedia Content

  1. Research Article

    A Novel Image Data Hiding Scheme with Diamond Encoding

    A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD) embedding schem...

    Ruey-Ming Chao, Hsien-Chu Wu, Chih-Chiang Lee and Yen-Ping Chu

    EURASIP Journal on Information Security 2009 2009:658047

    Published on: 4 May 2009

  2. Research Article

    Reliable Steganalysis Using a Minimum Set of Samples and Features

    This paper proposes to determine a sufficient number of images for reliable classification and to use feature selection to select most relevant features for achieving reliable steganalysis. First dimensionalit...

    Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten and Olli Simula

    EURASIP Journal on Information Security 2009 2009:901381

    Published on: 27 April 2009

  3. Research Article

    Steganography in 3D Geometries and Images by Adjacent Bin Mapping

    A steganographic method called adjacent bin mapping (ABM) is presented. Firstly, it is applied to 3D geometries by mapping the coordinates within two adjacent bins for data embedding. When applied to digital i...

    Hao-Tian Wu and Jean-Luc Dugelay

    EURASIP Journal on Information Security 2009 2009:317165

    Published on: 23 March 2009

  4. Research Article

    Peak-Shaped-Based Steganographic Technique for JPEG Images

    A novel model-based steganographic technique for JPEG images is proposed where the model, derived from heuristic assumptions about the shape of the DCT frequency histograms, is dependent on a stegokey. The sec...

    Lorenzo Rossi, Fabio Garzia and Roberto Cusani

    EURASIP Journal on Information Security 2009 2009:382310

    Published on: 10 February 2009

  5. Research Article

    How Reed-Solomon Codes Can Improve Steganographic Schemes

    The use of syndrome coding in steganographic schemes tends to reduce distortion during embedding. The more complete model comes from the wet papers (J. Fridrich et al., 2005) and allow to lock positions which ...

    Caroline Fontaine and Fabien Galand

    EURASIP Journal on Information Security 2009 2009:274845

    Published on: 12 January 2009