scispace - formally typeset
Open AccessBook ChapterDOI

A graph–theoretic approach to steganography

TLDR
A graph-theoretic approach to steganography based on the idea of exchanging rather than overwriting pixels is suggested and an algorithm based on this approach with support for several types of image and audio files is implemented.
Abstract
We suggest a graph-theoretic approach to steganography based on the idea of exchanging rather than overwriting pixels. We construct a graph from the cover data and the secret message. Pixels that need to be modified are represented as vertices and possible partners of an exchange are connected by edges. An embedding is constructed by solving the combinatorial problem of calculating a maximum cardinality matching. The secret message is then embedded by exchanging those samples given by the matched edges. This embedding preserves first-order statistics. Additionally, the visual changes can be minimized by introducing edge weights. We have implemented an algorithm based on this approach with support for several types of image and audio files and we have conducted computational studies to evaluate the performance of the algorithm.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Steganalysis by Subtractive Pixel Adjacency Matrix

TL;DR: A method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching.
Book

Steganography in Digital Media: Principles, Algorithms, and Applications

TL;DR: This clear, self-contained guide shows you how to understand the building blocks of covert communication in digital media files and how to apply the techniques in practice, including those of steganalysis, the detection of Steganography.
Proceedings ArticleDOI

Merging Markov and DCT Features for Multi-Class JPEG Steganalysis

TL;DR: In this article, a support vector machine (SVM) was used to construct a new multi-class JPEG steganalyzer with markedly improved performance by extending the 23 DCT feature set and applying calibration to the Markov features.
Proceedings ArticleDOI

Statistically undetectable jpeg steganography: dead ends challenges, and opportunities

TL;DR: The goal of this paper is to determine the steganographic capacity of JPEG images (the largest payload that can be undetectably embedded) with respect to current best steganalytic methods and to evaluate the influence of specific design elements and principles.
Proceedings ArticleDOI

Steganalysis by subtractive pixel adjacency matrix

TL;DR: A method for detection of steganographic methods that embed in the spatial domain by adding a low-amplitude independent stego signal, an example of which is least significant bit (LSB) matching.
References
More filters
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Book ChapterDOI

F5-A Steganographic Algorithm

TL;DR: The newly developed algorithm F5 withstands visual and statistical attacks, yet it still offers a large steganographic capacity because it implements matrix encoding to improve the efficiency of embedding and reduces the number of necessary changes.
Proceedings ArticleDOI

An O(v|v| c |E|) algoithm for finding maximum matching in general graphs

TL;DR: An 0(√|V|¿|E|) algorithm for finding a maximum matching in general graphs works in 'phases'.
Book ChapterDOI

Attacks on Steganographic Systems

TL;DR: In this paper, the authors present both visual and statistical attacks, making use of the ability of humans to clearly discern between noise and visual patterns, and automate statistical attacks which are much easier to automate.
Proceedings Article

Defending against statistical steganalysis

TL;DR: Improved methods for information hiding are presented and an a priori estimate is presented to determine the amount of data that can be hidden in the image while still being able to maintain frequency count based statistics.