2017
DOI: 10.1109/tifs.2017.2705625
|View full text |Cite
|
Sign up to set email alerts
|

Steganography With Multiple JPEG Images of the Same Scene

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
24
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(24 citation statements)
references
References 25 publications
0
24
0
Order By: Relevance
“…The encrypted text is known as cipher text, and in order to retrieve the text back the receiver needs the key which is only meant to be shared with the authorized users [7]. During this process data or information is encrypted into cipher text format with the help of the a secret key, and the secret key is only shared with only the authorized person so that only they are able to decrypt the data or information using the same key which is used to encrypt the data or information [9].…”
Section: Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…The encrypted text is known as cipher text, and in order to retrieve the text back the receiver needs the key which is only meant to be shared with the authorized users [7]. During this process data or information is encrypted into cipher text format with the help of the a secret key, and the secret key is only shared with only the authorized person so that only they are able to decrypt the data or information using the same key which is used to encrypt the data or information [9].…”
Section: Cryptographymentioning
confidence: 99%
“…Tomas Denemark et.al. [7] defined a substitute kind of side information after examining a course of action of different JPEG photos of a comparable scene for applications when the sender does not approach a pre-cover. The additional JPEG pictures were used to choose the favored furthest point of embeddings changes to adjust the costs of changing individual DCT coefficients in a current embedding plan.…”
Section: Cryptographymentioning
confidence: 99%
“…A steganography technique to protect JPEG images from tampering proposed capturing two identical images instead of generating a secret text [20]. The instance information was attached as a watermark to the actual image for validation purpose.…”
Section: Related Workmentioning
confidence: 99%
“…This rather labor intensive method, however, was not practical or secure also because of the inherent difficulty to estimate the acquisition noise properties in the developed domain. A much more practical version of this concept appeared in [11,10], where the authors showed how multiple JPEG images of the same scene can be used to infer the preferred direction of embedding changes made to quantized DCT coefficients.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, we make NS more practical by introducing JPEG compression and also by treating the developer as a black box. Similarly to [11,10], we use multiple instances of developed images in order to design our embedding strategy for each DCT coefficient.…”
Section: Introductionmentioning
confidence: 99%