2015 IEEE International Workshop on Information Forensics and Security (WIFS) 2015
DOI: 10.1109/wifs.2015.7368589
|View full text |Cite
|
Sign up to set email alerts
|

Side-informed steganography with additive distortion

Abstract: Side-informed steganography is a term used for embedding secret messages while utilizing a higher quality form of the cover object called the precover. The embedding algorithm typically makes use of the quantization errors available when converting the precover to a lower quality cover object. Virtually all previously proposed side-informed steganographic schemes were limited to the case when the side-information is in the form of an uncompressed image and the embedding uses the unquantized DCT coefficients to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
35
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(36 citation statements)
references
References 22 publications
(35 reference statements)
1
35
0
Order By: Relevance
“…We follow this approach in our research. Therefore, a grayscale input image can be represented as X = (x pq ) M×N = C + N, where C = (c pq ) M×N , c pq ∈ R denotes the corresponding cover image, and N = (n pq ) M×N , n pq ∈ R denotes the additive stego noise 10 .…”
Section: Appendix a Theoretical Reflectionmentioning
confidence: 99%
See 4 more Smart Citations
“…We follow this approach in our research. Therefore, a grayscale input image can be represented as X = (x pq ) M×N = C + N, where C = (c pq ) M×N , c pq ∈ R denotes the corresponding cover image, and N = (n pq ) M×N , n pq ∈ R denotes the additive stego noise 10 .…”
Section: Appendix a Theoretical Reflectionmentioning
confidence: 99%
“…That is to say, for each given z (2) rs , it is only the weighted sum of lower-layer inputs located in a m × n local area with index (r, s) as its centre irrespective of boundary condition, and the weights used in the weighted sum are shared in the calculation of all the z (2) rs , 1 ≤ r ≤ M, 1 ≤ s ≤ N. By rewriting (1) using two-dimensional indexing, setting l = 1, a (1) pq = x pq and restrict the size of the dot product to m × n (m and n assume to be odd to omit unimportant details), we get: (10) In (10), · denotes the ceiling operation. From (10) we can see that if the convolutional layer is initialized with kernels which are already sensitive to the stego noise (e.g. KV kernel) or is regularized as high-pass as proposed in [34], then m can be suppressed.…”
Section: Appendix a Theoretical Reflectionmentioning
confidence: 99%
See 3 more Smart Citations