Skip to content

Advertisement

Secure Steganography in Multimedia Content

  1. Content type: Research Article

    A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the exploiting modification direction (EMD) embedding schem...

    Authors: Ruey-Ming Chao, Hsien-Chu Wu, Chih-Chiang Lee and Yen-Ping Chu

    Citation: EURASIP Journal on Information Security 2009 2009:658047

    Published on:

  2. Content type: Research Article

    This paper proposes to determine a sufficient number of images for reliable classification and to use feature selection to select most relevant features for achieving reliable steganalysis. First dimensionalit...

    Authors: Yoan Miche, Patrick Bas, Amaury Lendasse, Christian Jutten and Olli Simula

    Citation: EURASIP Journal on Information Security 2009 2009:901381

    Published on:

  3. Content type: Research Article

    A steganographic method called adjacent bin mapping (ABM) is presented. Firstly, it is applied to 3D geometries by mapping the coordinates within two adjacent bins for data embedding. When applied to digital i...

    Authors: Hao-Tian Wu and Jean-Luc Dugelay

    Citation: EURASIP Journal on Information Security 2009 2009:317165

    Published on:

  4. Content type: Research Article

    A novel model-based steganographic technique for JPEG images is proposed where the model, derived from heuristic assumptions about the shape of the DCT frequency histograms, is dependent on a stegokey. The sec...

    Authors: Lorenzo Rossi, Fabio Garzia and Roberto Cusani

    Citation: EURASIP Journal on Information Security 2009 2009:382310

    Published on:

  5. Content type: Research Article

    The use of syndrome coding in steganographic schemes tends to reduce distortion during embedding. The more complete model comes from the wet papers (J. Fridrich et al., 2005) and allow to lock positions which ...

    Authors: Caroline Fontaine and Fabien Galand

    Citation: EURASIP Journal on Information Security 2009 2009:274845

    Published on: