2016
DOI: 10.1007/s11432-015-5367-x
|View full text |Cite
|
Sign up to set email alerts
|

Stego key searching for LSB steganography on JPEG decompressed image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 10 publications
0
16
0
Order By: Relevance
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…As the steganography techniques could be maliciously used for stealing confidential information, it is practically significant to carry on researches to forensics of the crime. For decades, researchers have proposed many techniques for the forensics of steganography, including the stego detection [2][3][4][5][6][7][8][9][10], the payload location [11][12][13][14][15], the embedding key restore [16,17], the secret message extraction [17], and the steganographer detection [18][19][20]. In practice, the covert communication entity on the Internet usually acts as the user of social platforms, whose location is virtual.…”
Section: Introductionmentioning
confidence: 99%
“…For example, when there are only 10 stego images embedded by JSteg along the same path, the best CSW-JSteg algorithm can only locate the stego position with an accuracy of 55.67%, which is close to that of random guessing. In order to test the applicability of the location results, this section applied the location result to the collision attack algorithm proposed in formula, 12 as follows:…”
Section: Applicability Of Payload Location Resultsmentioning
confidence: 99%
“…Under certain specific conditions, these algorithms have been used to estimate groups in group parity steganography, 30 determine the stego pixel order in random steganography, 31 and even restore the stego key and extract the hidden message. 12,29 However, these algorithms are only suitable for spatial LSB replacement, LSB matching, and MLSB replacement steganography.…”
Section: Introductionmentioning
confidence: 99%
“…Other than this several universal steganalytic algorithms (Shi et al, 2005;Goljan et al, 2006) are also existing that can detect the LSBM with high accurate rate of detection. Liu et al (2016) defined the stego key searched and recovered model for the LSB steganography. On the other hand, comparison done with LSB, pixel value differencing, radix numeral based steganography has been proposed (Geetha et al, 2011).…”
Section: Impact Of High Dimensional Feature Space In Steganalysismentioning
confidence: 99%