2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) 2013
DOI: 10.1109/iwcmc.2013.6583717
|View full text |Cite
|
Sign up to set email alerts
|

A novel active warden steganographic attack for next-generation steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…The similar methods used in video and audio data have been proposed in Refs. [23,[25][26][27][28][29]. In this paper, the proposed method emphasizes on the generic attacking architecture in the image domain.…”
Section: Active Attack Methodsmentioning
confidence: 99%
“…The similar methods used in video and audio data have been proposed in Refs. [23,[25][26][27][28][29]. In this paper, the proposed method emphasizes on the generic attacking architecture in the image domain.…”
Section: Active Attack Methodsmentioning
confidence: 99%
“…• Active steganalysis is barely addressed by investigators because it is very greedy in processing time and often severely affects the cover media [8]. • The video steganalysis algorithms that utilize the temporal redundancies at the frame level and inter-frame level have been observed to be more effective than algorithms based on spatial redundancies only.…”
Section: General Steganalysis Rules and Principlesmentioning
confidence: 99%
“…Because of the strong temporal correlation between adjacent frames, the frame difference signal of the cover video can be commonly approximated by a Laplacian distribution [22]. Active steganalysis is barely addressed by investigators because it is very greedy in processing time and often severely affects the cover media [8]. The video steganalysis algorithms that utilize the temporal redundancies at the frame level and inter‐frame level have been observed to be more effective than algorithms based on spatial redundancies only.…”
Section: General Steganalysis Rules and Principlesmentioning
confidence: 99%
See 1 more Smart Citation
“…DST was first proposed as a way to attack the steganography embedded in the multimedia signal [12][13][14][15][16][17]. The basic idea of DST is to eliminate the perceptual redundancy of the multimedia signal [18][19][20].…”
Section: Introductionmentioning
confidence: 99%