Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security 2021
DOI: 10.1145/3437880.3460407
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Additive Approximations of Non-additive Distortion Functions

Abstract: HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 25 publications
0
8
0
Order By: Relevance
“…Another interesting observation is that J-UNIWARD, the only algorithm not dealing with any rounding errors, disrupts both mean and variance. Lastly, even though SI-UNIWARD makes the most embedding changes among the tested steganographic schemes 3 , it perfectly preserves mean and variance in the error domain 𝑒 𝑖 𝑗 , which we believe is the main reason of its superior security.…”
Section: Sparsitymentioning
confidence: 91%
See 1 more Smart Citation
“…Another interesting observation is that J-UNIWARD, the only algorithm not dealing with any rounding errors, disrupts both mean and variance. Lastly, even though SI-UNIWARD makes the most embedding changes among the tested steganographic schemes 3 , it perfectly preserves mean and variance in the error domain 𝑒 𝑖 𝑗 , which we believe is the main reason of its superior security.…”
Section: Sparsitymentioning
confidence: 91%
“…Note that typically these steganographic algorithms yield symmetric costs, 𝜌 + 𝑖 = 𝜌 − 𝑖 , which inherently leads to symmetric change rates 𝛽 + 𝑖 = 𝛽 − 𝑖 . This is a potential drawback of such schemes, because it was shown many times that asymmetric costs can produce better security [2][3][4]29].…”
Section: Embedding Strategiesmentioning
confidence: 99%
“…This might seem superfluous in most deep learning applications that are fully automated without human interference, especially in terms of the generalizability of this work. However, we argue that in most scenarios, adversaries are confronted with naturally imposed constraints, such as conveying the original message in steganography [58] or maintaining the intended effect when circumventing malware detection [59]. Therefore, the constraints imposed on the adversary in this work should be seen as representative of any constraints that might be encountered in specific use cases.…”
Section: Discussionmentioning
confidence: 99%
“…Compared to the work presented in [14], this paper provides necessary supplementary materials, including :…”
Section: A Contributions Of the Papermentioning
confidence: 99%