Steganography using Gabor filter and anisotropic diffusion (original) (raw)

Access this article

Log in via an institution

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

References

  1. Al-Otaibi NA, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lect NoteS Inform Theory 2
  2. Al-Otaibi NA, Gutub AA (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), pp 250–256
  3. Alotaibi N, Gutub A, Khan E (2015, April) Stego-system for hiding text in images of personal computers. In: The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning
  4. Bas P, Filler T, Pevný T (2011) Break our steganographic system: the ins and outs of organizing BOSS. In: 13th International Conference,International Workshop on Information Hiding, pp 59–70
  5. Denemark T, Sedighi V, Holub V, Cogranne R, Fridrich J (2014, December) Selection-channel-aware rich model for steganalysis of digital images. In: Information Forensics and Security (WIFS), 2014 I.E. International Workshop on, IEEE, pp 48–53
  6. Filler T, Fridrich JJ (2009, June) Fisher Information Determines Capacity of ε-Secure Steganography. In: Information Hiding vol. 5806, pp 31–47
  7. Filler T, Fridrich JJ (2011, January) Design of adaptive steganographic schemes for digital images. In: Media Forensics and Security p 78800F
  8. Filler T, Judas J, Fridrich J (2011) Minimizing additive distortion in steganography using syndrome-trellis codes. IEEE Trans Inf Forensics Secur 6(3):920–935
    Article Google Scholar
  9. Fridrich J, Kodovsky J (2012) Rich models for steganalysis of digital images. IEEE Trans Inf Forensics Secur 7(3):868–882
    Article Google Scholar
  10. Fridrich JJ, Kodovský J (2013, May) Multivariate gaussian model for designing additive distortion for steganography. In: ICASSP, pp 2949–2953
  11. Fridrich J, Pevný T, Kodovský J (2007, September) Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. In: Proceedings of the 9th workshop on Multimedia & security, ACM, pp 3–14
  12. Gul G, Kurugollu F (2011) A new methodology in steganalysis: breaking highly undetectable steganograpy (HUGO). In: 13th International Conference,International Workshop on Information Hiding, pp 71–84
  13. Guo L, Ni J, Shi YQ (2014) Uniform embedding for efficient JPEG steganography. IEEE Trans Inf Forensics Secur 9(5):814–825
    Article Google Scholar
  14. Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for JPEG steganography: uniform embedding revisited. IEEE Trans Inf Forensics Secur 10(12):2669–2680
    Article Google Scholar
  15. Holub V, Fridrich J (2012, December) Designing steganographic distortion using directional filters. In: Information Forensics and Security (WIFS), 2012 I.E. International Workshop on, IEEE, pp 234–239
  16. Holub V, Fridrich J (2013, June) Digital image steganography using universal distortion. In: Proceedings of the first ACM workshop on Information hiding and multimedia security, ACM, pp 59–68
  17. Holub V, Fridrich J (2015) Low-complexity features for JPEG steganalysis using undecimated DCT. IEEE Trans Inf Forensics Secur 10(2):219–228
    Article Google Scholar
  18. Kodovsky J, Fridrich J, Holub V (2012) Ensemble classifiers for steganalysis of digital media. IEEE Trans Inf Forensics Secur 7(2):432–444
    Article Google Scholar
  19. Li B, Wang M, Huang J, Li X (2014, October) A new cost function for spatial image steganography. In: Image Processing (ICIP), 2014 I.E. International Conference on, IEEE, pp 4206–4210
  20. Pevny T, Bas P, Fridrich J (2010) Steganalysis by subtractive pixel adjacency matrix. IEEE Trans Inf Forensics Secur 5(2):215–224
    Article Google Scholar
  21. Sedighi V, Fridrich J (2016, September) Effect of saturated pixels on security of steganographic schemes for digital images. In: Image Processing (ICIP), 2016 I.E. International Conference on, IEEE, pp 2747–2751
  22. Sedighi V, Fridrich JJ, Cogranne R (2015, March) Content-adaptive pentary steganography using the multivariate generalized Gaussian cover model. In: Media Watermarking, Security, and Forensics, p 94090H
  23. Sedighi V, Cogranne R, Fridrich J (2016) Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur 11(2):221–234
    Article Google Scholar
  24. Song X, Liu F, Yang C, Luo X, Zhang Y (2015, June) Steganalysis of adaptive JPEG steganography using 2D Gabor filters. In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, ACM, pp 15–23
  25. Song X, Liu F, Zhang Z, Yang C, Luo X, Chen L (2016) 2D Gabor filters-based steganalysis of content-adaptive JPEG steganography. Multimed Tools Appl 1–29. https://doi.org/10.1007/s11042-016-4157-9
  26. Xie X, Livermore C (2016, January) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. In: Micro Electro Mechanical Systems (MEMS), 2016 I.E. 29th International Conference on, IEEE, pp 75–78
  27. Xie X, Zaitsev Y, Velásquez-García LF, Teller SJ, Livermore C (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24(12):125014
    Article Google Scholar
  28. Xie X, Zaitsev Y, Velasquez-Garcia L, Teller S, Livermore C (2014) Compact, scalable, high-resolution, MEMS-enabled tactile displays. In: Proc of Solid-State Sensors, Actuators, and Microsystems Workshop, pp 127–130

Download references