it discusses several information hiding methods useable for steganographic communication, among them substitution systems, hiding methods in two-color images, transform domain techniques, statistical steganography, distortion and cover generation te
YASS is a steganographic algorithm for digital images that hides messages robustly in a key-dependent transform domain so that the stego image can be subsequently compressed and distributed as JPEG. Given the fact that state-of-the-art blind stegana
This paper presents a new approach to defining additive steganographic distortion in the spatial domain. The change in the output of directional high-pass filters after changing one pixel is weighted and then aggregated using the reciprocal Hölder n
This letter proposes a modification to the least-significant-bit (LSB) matching, a steganographic method for embeddingmessage bits into a still image. In the LSB matching, the choice of whether to add or subtract one from the cover image pixel is ran
Unlike traditional video steganography, motion-vectors-based steganographic approaches embed messages by modifying the motion vectors of the cover video. The scheme may produce little quality degradation of the stego video and little influence on the
MP3Stego is a typical steganographic tool for MP3 audio, which embeds secret message into MP3 audio according to the parity of the block length. In this paper, a detection method for MP3Stego based on the differential statistics of quantization step
MP3Stego is a typical steganographic tool for MP3 audio, which embeds secret message into MP3 audio according to the parity of the block length. In this work, we present a steganalytic method to attack MP3Stego. The big_values inside information is c