Fridrich et al., 2003 - Google Patents
New methodology for breaking steganographic techniques for JPEGsFridrich et al., 2003
View PDF- Document ID
- 12655361624725002162
- Author
- Fridrich J
- Goljan M
- Hogea D
- Publication year
- Publication venue
- Security and watermarking of multimedia contents V
External Links
Snippet
In this paper, we present general methodology for developing attacks on steganographic systems for the JPEG image format. The detection first starts by decompressing the JPEG stego image, geometrically distorting it (eg, by cropping), and recompressing. Because the …
- 238000000034 method 0 title abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fridrich et al. | New methodology for breaking steganographic techniques for JPEGs | |
Fridrich et al. | Quantitative steganalysis of digital images: estimating the secret message length | |
Fridrich et al. | Attacking the outguess | |
Fridrich et al. | Steganalysis of JPEG images: Breaking the F5 algorithm | |
US7031491B1 (en) | Method for determining a partition in order to insert a watermark, and associated insertion and decoding methods | |
Fridrich et al. | Higher-order statistical steganalysis of palette images | |
Fridrich et al. | Maximum likelihood estimation of length of secret message embedded using±k steganography in spatial domain | |
EP0984616B1 (en) | Method and apparatus for digital watermarking | |
Denemark et al. | Steganalysis features for content-adaptive JPEG steganography | |
US6512837B1 (en) | Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration | |
EP2410726B1 (en) | Digital watermark detection apparatus, method and program | |
US7523311B1 (en) | Method for embedding electronic watermark, decoding method, and devices for the same | |
RU2367018C2 (en) | Detecting watermarks | |
El-sayed et al. | Adaptive difference expansion-based reversible data hiding scheme for digital images | |
US7283643B2 (en) | Determination of a segmentation of a digital signal for inserting watermarking signals and the associated insertion | |
Tzschoppe et al. | Steganographic system based on higher-order statistics | |
EP1634238B1 (en) | Watermarking | |
US20080209220A1 (en) | Method of Quantization-Watermarking | |
Abraham et al. | Image watermarking using DCT in selected pixel regions | |
Nakamura et al. | Improved digital watermark robustness against translation and/or cropping of an image area | |
Tefas et al. | Multi-bit image watermarking robust to geometric distortions | |
Rakhmawati et al. | Exploiting self-embedding fragile watermarking method for image tamper detection and recovery | |
Kumar et al. | Steganography and Steganalysis of JPEG images | |
US20050144456A1 (en) | Robust digital image watermarking utilizing a Walsh transform algorithm | |
EP1700265B1 (en) | Estimation of quantisation step sizes for a watermark detector |