期刊文献+

Undercover communication using image and text as disguise and countermeasures 被引量:3

Undercover communication using image and text as disguise and countermeasures
下载PDF
导出
摘要 A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors' laboratory are introduced, including symmetric LSB embedding, secure steganography in JPEG, palette, and uncompressed color images, histogram-based analysis and least histogram abnormality steganography, multiple-base notational system based embedding, stego-encoding integrated with error correction, etc. Some of the proposed approaches provide overall improvement, while others offer alternatives to existing techniques with advantage in certain aspects. Data hiding in text using the typesetting tool TeX is also introduced, with a brief description of a recently developed technique. Current research topics and the future plan are outlined. The discussion is focused mainly on steganography/steganalysis in still images. A brief survey of some representative techniques of steganography and steganalysis is presented. Various methods developed in the authors' laboratory are introduced, including symmetric LSB embedding, secure steganography in JPEG, palette, and uncompressed color images, histogram-based analysis and least histogram abnormality steganography, multiple-base notational system based embedding, stego-encoding integrated with error correction, etc. Some of the proposed approaches provide overall improvement, while others offer alternatives to existing techniques with advantage in certain aspects. Data hiding in text using the typesetting tool TeX is also introduced, with a brief description of a recently developed technique. Current research topics and the future plan are outlined. The discussion is focused mainly on steganography/steganalysis in still images.
出处 《Journal of Shanghai University(English Edition)》 CAS 2006年第1期33-43,共11页 上海大学学报(英文版)
基金 ProjectsupportedbyNationalNaturalScienceFoundationofChina(GrantNo.60372090),KeyProjectofShanghaiMunicipalityforBasicResearch(GrantNo.04JC14037),andShanghaiLeadingAcademicDisciplineProject(GrantNo.T0102)
关键词 STEGANOGRAPHY STEGANALYSIS information hiding covert communication security. steganography, steganalysis, information hiding, covert communication, security.
  • 相关文献

参考文献11

  • 1王朔中,张新鹏,张开文.Steganographic Technique Capable of Withstanding RQP Analysis[J].Journal of Shanghai University(English Edition),2002,6(4):273-277. 被引量:5
  • 2Zhang X,Wang S,Zhang K.A novel LSB steganography scheme against statistical analysis[].Journal of I mage and Graphics.2003 被引量:1
  • 3Bender W,Gruhl D,Mori moto N,et al.Techniques for data hiding[].IBM Syste mJournal.1996 被引量:1
  • 4Noda N,Spaulding J,Shirazi M N,et al.Application of bit-plane decomposition steganography to JPEG2000en-coded i mages[].IEEE Signal Processing Letters.2002 被引量:1
  • 5Zhang X,Wang S.Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security[].Pattern Recognition.2004 被引量:1
  • 6Provos N,Honeyman P.Hide and seek:an introduction to steganography[].IEEE SecurityandPrivacy.2003 被引量:1
  • 7Maxemchuk N F,Low S H.Performance comparison oftwo text marking method[].IEEE Journal Selected Areas of Communications.1998 被引量:1
  • 8Ker A D.Steganalysis of LSB matchingin grayscalei mag-es[].IEEE Signal Processing Letters.2005 被引量:1
  • 9Zhang X,Wang S,Zhang K.Steganography with theleast histogram abnormality[].Lecture Notes in Computer Science.2003 被引量:1
  • 10Zhang X,Wang S.Steganography using multiple-base no-tational system and human vision sensitivity[].IEEE Signal Processing Letters.2005 被引量:1

共引文献4

同被引文献7

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部