2014 International Wireless Communications and Mobile Computing Conference (IWCMC) 2014
DOI: 10.1109/iwcmc.2014.6906416
|View full text |Cite
|
Sign up to set email alerts
|

Steganography attack based on Discrete Spring Transform and image geometrization

Abstract: Abstract-In order to prevent harmful secret information sharing by steganography, a new active-warden countermeasure approach against steganography is proposed in this paper. Differently from the other countermeasure approaches presented in current literature which need to have some knowledge of the steganographic algorithms to be attacked, our proposed method is a generic method which is independent of any particular steganography methods being utilized. In other words, our approach blindly attacks the stegan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
(13 reference statements)
0
3
0
Order By: Relevance
“…These techniques were able to maintain an acceptable audio quality. Another method which will effectively remove the steganographic information in spatial and frequency domain for image, video and audio was introduced by Sharp, A., et al [22][23][24]. Authors proposed an attack using discrete spring transform which will only distort the numerical value of the carrier media while keeping visual quality in a high level.…”
Section: Related Workmentioning
confidence: 99%
“…These techniques were able to maintain an acceptable audio quality. Another method which will effectively remove the steganographic information in spatial and frequency domain for image, video and audio was introduced by Sharp, A., et al [22][23][24]. Authors proposed an attack using discrete spring transform which will only distort the numerical value of the carrier media while keeping visual quality in a high level.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the highly robust steganographies are built based on the existing methods . Those methods match the features of the normal carriers to protect the hidden data to be discovered by the countermeasures.…”
Section: Literature Reviewmentioning
confidence: 99%
“…DST was first proposed as a way to attack the steganography embedded in the multimedia signal [12][13][14][15][16][17]. The basic idea of DST is to eliminate the perceptual redundancy of the multimedia signal [18][19][20].…”
Section: Introductionmentioning
confidence: 99%